WO2008070263A3 - Method and apparatus for interfacing with a restricted access computer system - Google Patents

Method and apparatus for interfacing with a restricted access computer system Download PDF

Info

Publication number
WO2008070263A3
WO2008070263A3 PCT/US2007/080522 US2007080522W WO2008070263A3 WO 2008070263 A3 WO2008070263 A3 WO 2008070263A3 US 2007080522 W US2007080522 W US 2007080522W WO 2008070263 A3 WO2008070263 A3 WO 2008070263A3
Authority
WO
WIPO (PCT)
Prior art keywords
computer
interfacing
restricted access
interface controller
data storage
Prior art date
Application number
PCT/US2007/080522
Other languages
French (fr)
Other versions
WO2008070263A2 (en
Inventor
Erix Pizano
Original Assignee
Ceelox Inc
Erix Pizano
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ceelox Inc, Erix Pizano filed Critical Ceelox Inc
Publication of WO2008070263A2 publication Critical patent/WO2008070263A2/en
Publication of WO2008070263A3 publication Critical patent/WO2008070263A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Abstract

An apparatus (200) for interfacing with a restricted access computer (10) includes a data storage component (202), a peripheral component (204), and an interface controller (206). The interface controller (206) enables electronic communication between the peripheral component (204) and the computer (10) and between the data storage component (202) and the computer (10). The interface controller (206) communicates data to the computer (10) indicating to the computer (10) that the computer (10) is operable to interact with the peripheral component using software already installed on the computer (10). The computer (10) automatically executes a computer program stored on the data storage component (202) of the apparatus (200) that enables the computer (10) to transparently encrypt and decrypt data via a biometricaily secure process.
PCT/US2007/080522 2006-10-13 2007-10-05 Method and apparatus for interfacing with a restricted access computer system WO2008070263A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/549,206 US7818395B2 (en) 2006-10-13 2006-10-13 Method and apparatus for interfacing with a restricted access computer system
US11/549,206 2006-10-13

Publications (2)

Publication Number Publication Date
WO2008070263A2 WO2008070263A2 (en) 2008-06-12
WO2008070263A3 true WO2008070263A3 (en) 2008-09-12

Family

ID=39304331

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/080522 WO2008070263A2 (en) 2006-10-13 2007-10-05 Method and apparatus for interfacing with a restricted access computer system

Country Status (3)

Country Link
US (7) US7818395B2 (en)
TW (1) TWI353522B (en)
WO (1) WO2008070263A2 (en)

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7962755B2 (en) * 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US7818395B2 (en) * 2006-10-13 2010-10-19 Ceelox, Inc. Method and apparatus for interfacing with a restricted access computer system
JP4303311B2 (en) * 2006-10-13 2009-07-29 株式会社コアアプリ Operation support computer program, operation support computer system
US8356333B2 (en) * 2006-12-12 2013-01-15 Bespoke Innovations Sarl System and method for verifying networked sites
NL1036400C2 (en) * 2009-01-09 2010-07-13 Priv Id B V Method and system for verifying the identity of an individual by employing biometric data features associated with the individual.
JP5429880B2 (en) * 2010-08-10 2014-02-26 Necビッグローブ株式会社 Application distribution system, application distribution method, terminal, and program
JP5539126B2 (en) * 2010-09-09 2014-07-02 キヤノン株式会社 Data processing apparatus, control method, and program
IL210169A0 (en) 2010-12-22 2011-03-31 Yehuda Binder System and method for routing-based internet security
US10620794B2 (en) * 2010-12-23 2020-04-14 Apple Inc. Device, method, and graphical user interface for switching between two user interfaces
KR101373557B1 (en) * 2012-07-12 2014-03-24 주식회사 파수닷컴 User terminal device and method for encrypting in cloud computing environments
CN102819500B (en) * 2012-07-20 2016-01-20 腾讯科技(深圳)有限公司 A kind of method and device creating peripheral equipment control interface
US9232176B2 (en) 2013-03-04 2016-01-05 Janus Technologies, Inc. Method and apparatus for securing computer video and audio subsystems
US20150033266A1 (en) 2013-07-24 2015-01-29 United Video Properties, Inc. Methods and systems for media guidance applications configured to monitor brain activity in different regions of a brain
US9424443B2 (en) 2013-08-20 2016-08-23 Janus Technologies, Inc. Method and apparatus for securing computer mass storage data
US11210432B2 (en) 2013-08-20 2021-12-28 Janus Technologies, Inc. Method and apparatus for selectively snooping and capturing data for secure computer interfaces
US9076003B2 (en) 2013-08-20 2015-07-07 Janus Technologies, Inc. Method and apparatus for transparently encrypting and decrypting computer interface data
US9384150B2 (en) 2013-08-20 2016-07-05 Janus Technologies, Inc. Method and apparatus for performing transparent mass storage backups and snapshots
US9684805B2 (en) 2013-08-20 2017-06-20 Janus Technologies, Inc. Method and apparatus for securing computer interfaces
US9231921B2 (en) 2013-08-20 2016-01-05 Janus Technologies, Inc. System and architecture for secure computer devices
US9215250B2 (en) 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
EP3047601B1 (en) 2013-09-19 2019-07-10 Intel Corporation Technologies for synchronizing and restoring reference templates
US10783524B2 (en) * 2013-12-13 2020-09-22 Energyhub, Inc. Resource customer identity verification
CN104732166A (en) * 2013-12-20 2015-06-24 华为技术有限公司 Data storing and reading method and device and equipment
US20150180655A1 (en) * 2013-12-20 2015-06-25 Huawei Technologies Co., Ltd. Data storing and reading methods, apparatuses and devices
US9817990B2 (en) * 2014-03-12 2017-11-14 Samsung Electronics Co., Ltd. System and method of encrypting folder in device
US9531708B2 (en) * 2014-05-30 2016-12-27 Rovi Guides, Inc. Systems and methods for using wearable technology for biometric-based recommendations
US9634833B2 (en) * 2014-06-20 2017-04-25 Google Inc. Gesture-based password entry to unlock an encrypted device
US9910655B1 (en) * 2014-11-06 2018-03-06 Accellion, Inc. Secure content platform software developer kit
US9813906B2 (en) * 2014-11-12 2017-11-07 Qualcomm Incorporated Mobile device to provide enhanced security based upon contextual sensor inputs
US20160261593A1 (en) * 2015-03-06 2016-09-08 CallSign, Inc. Systems and methods for decentralized user authentication
US11032286B1 (en) * 2015-12-02 2021-06-08 United Services Automobile Association (Usaa) Block chain authentication systems and methods
US11270309B1 (en) * 2015-12-29 2022-03-08 Wells Fargo Bank, N.A. Biometric token that functions as a universal identifier
US10419401B2 (en) * 2016-01-08 2019-09-17 Capital One Services, Llc Methods and systems for securing data in the public cloud
US10523663B2 (en) * 2016-01-10 2019-12-31 Apple Inc. Shared password protection within applications
US10466891B2 (en) * 2016-09-12 2019-11-05 Apple Inc. Special lock mode user interface
US9824206B1 (en) 2016-09-29 2017-11-21 International Business Machines Corporation Eye gazing passcode generation crossing augmented reality (AR) and virtual reality (VR) devices
US9871774B1 (en) 2016-09-29 2018-01-16 International Business Machines Corporation Secured file transfer management on augmented reality (AR) and virtual reality (VR) devices
WO2018134945A1 (en) * 2017-01-19 2018-07-26 株式会社クリエイターズ・ヘッド Information control program, information control system, and information control method
US10146925B1 (en) 2017-05-19 2018-12-04 Knowledge Initiatives LLC Multi-person authentication and validation controls for image sharing
US10541999B1 (en) 2017-05-19 2020-01-21 Knowledge Initiatives LLC Multi-person authentication and validation controls for image sharing
US10462129B2 (en) * 2017-07-10 2019-10-29 Leigh M. Rothschild System and method for gaining access of devices based on user's identity
WO2019078858A1 (en) * 2017-10-18 2019-04-25 Visa International Service Association Biometric data security system and method
US10862998B2 (en) 2018-11-06 2020-12-08 Citrtix Systems, Inc. Systems and methods for managing downloads from an embedded browser
US10354058B1 (en) 2018-11-21 2019-07-16 Capital One Services, Llc Systems and methods for safely storing an object
KR20200100481A (en) * 2019-02-18 2020-08-26 삼성전자주식회사 Electronic device for authenticating biometric information and operating method thereof
US11392711B2 (en) 2019-03-21 2022-07-19 Microsoft Technology Licensing, Llc Authentication state-based permission model for a file storage system
US11063955B2 (en) * 2019-10-17 2021-07-13 Leigh Rothschild System and method for gaining access of devices based on user's identity
US11328080B2 (en) 2019-11-18 2022-05-10 Frostbyte, Llc Cryptographic key management
KR20210064854A (en) * 2019-11-26 2021-06-03 삼성전자주식회사 Memory controller, storage device including the same, and operating method of the memory controller
US11483147B2 (en) * 2020-01-23 2022-10-25 Bank Of America Corporation Intelligent encryption based on user and data properties
US11606196B1 (en) * 2022-06-01 2023-03-14 Uab 360 It Authentication system for a multiuser device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774652A (en) * 1995-09-29 1998-06-30 Smith; Perry Restricted access computer system
US6321334B1 (en) * 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US20050149742A1 (en) * 2003-11-06 2005-07-07 Alcatel Biometric access method

Family Cites Families (60)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3715725A (en) * 1971-01-11 1973-02-06 Dick Co Ab Address responsive controller for computer handling of peripheral equipment
US6850252B1 (en) * 1999-10-05 2005-02-01 Steven M. Hoffberg Intelligent electronic appliance system and method
US5864683A (en) * 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US6698654B1 (en) * 1995-05-09 2004-03-02 Smartmove (Nz) Ltd. Method of interfacing with data storage card
US5969529A (en) * 1996-03-14 1999-10-19 Sharp Kabushiki Kaisha Electronic apparatus having battery power source
GB2329497B (en) * 1997-09-19 2001-01-31 Ibm Method for controlling access to electronically provided services and system for implementing such method
US6925182B1 (en) * 1997-12-19 2005-08-02 Koninklijke Philips Electronics N.V. Administration and utilization of private keys in a networked environment
US6026408A (en) * 1998-01-28 2000-02-15 Unisys Corp. Method for synchronizing the schema of a database with its representation in an object-oriented repository
US6347374B1 (en) * 1998-06-05 2002-02-12 Intrusion.Com, Inc. Event detection
US7111173B1 (en) 1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit
US6230165B1 (en) * 1998-10-16 2001-05-08 Cerulean Method for encoding and transporting database objects over bandwidth constrained networks
US7315826B1 (en) * 1999-05-27 2008-01-01 Accenture, Llp Comparatively analyzing vendors of components required for a web-based architecture
DE19964198A1 (en) * 1999-07-15 2001-04-12 Erland Wittkoetter Data processing device
US7398220B1 (en) * 1999-11-04 2008-07-08 Certificate Exchange Llc Internet insurance certificate system
US6996720B1 (en) * 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
JP3250557B2 (en) * 1999-12-20 2002-01-28 いわき電子株式会社 Encryption display card
US6920565B2 (en) * 2000-06-05 2005-07-19 Iomega Corporation Method and system for providing secure digital music duplication
US6775776B1 (en) * 2000-06-27 2004-08-10 Intel Corporation Biometric-based authentication in a nonvolatile memory device
US20020123359A1 (en) * 2000-12-01 2002-09-05 Multiscience System Pte Limited Network for information transfer for mobile stations
US6884162B2 (en) * 2000-12-01 2005-04-26 Sony Corporation System and method to support gaming in an electronic network
US8365067B2 (en) * 2000-12-15 2013-01-29 International Business Machines Corporation Method and system for moving single documents between a document processing system and a document repository
US6954851B2 (en) * 2000-12-26 2005-10-11 Intel Corporation Method for sharing a device for non-operating system uses by generating a false remove signal to divert the device into a sleep state
JP4366029B2 (en) * 2001-02-09 2009-11-18 セイコーエプソン株式会社 Image file generation device, image processing device, image file generation method, image processing method, computer program, and recording medium
US6895104B2 (en) * 2001-02-16 2005-05-17 Sac Technologies, Inc. Image identification system
US7076738B2 (en) * 2001-03-02 2006-07-11 Semantic Compaction Systems Computer device, method and article of manufacture for utilizing sequenced symbols to enable programmed application and commands
US7004401B2 (en) * 2001-08-10 2006-02-28 Cerys Systems, Inc. System and method for regulating agriculture storage facilities in order to promote uniformity among separate storage facilities
US7853803B2 (en) * 2001-09-28 2010-12-14 Verizon Corporate Services Group Inc. System and method for thwarting buffer overflow attacks using encrypted process pointers
US7299067B2 (en) * 2001-10-12 2007-11-20 Lee Riggs Methods and systems for managing the provision of training provided remotely through electronic data networks to users of remote electronic devices
US6842810B1 (en) * 2001-10-18 2005-01-11 Emc Corporation Restricted access devices
FR2831360B1 (en) * 2001-10-19 2004-02-06 Viaccess Sa INTERACTIVE PROTOCOL FOR THE REMOTE MANAGEMENT OF ACCESS CONTROL OF BROKEN INFORMATION
JP3934925B2 (en) * 2001-12-03 2007-06-20 本田技研工業株式会社 Cable-type steering device
US20030163739A1 (en) * 2002-02-28 2003-08-28 Armington John Phillip Robust multi-factor authentication for secure application environments
AU2003247364A1 (en) * 2002-05-15 2003-12-02 Bio-Key International, Inc. Match template protection within biometric security systems
CA2490226C (en) * 2002-05-21 2012-04-24 Bio-Key International, Inc. Systems and methods for secure biometric authentication
US7415605B2 (en) * 2002-05-21 2008-08-19 Bio-Key International, Inc. Biometric identification network security
US7334130B2 (en) 2002-07-19 2008-02-19 Bowers Charles R Method and apparatus for managing confidential information
EP1527550A4 (en) * 2002-07-25 2008-10-01 Bio Key Int Inc Trusted biometric device
JP4433472B2 (en) * 2002-08-08 2010-03-17 ナンヤン テクノロジカル ユニヴァーシティ Distributed authentication processing
US20040064453A1 (en) * 2002-09-27 2004-04-01 Antonio Ruiz Large-scale hierarchical identification and verification for secured ingress and egress using biometrics
US7478248B2 (en) * 2002-11-27 2009-01-13 M-Systems Flash Disk Pioneers, Ltd. Apparatus and method for securing data on a portable storage device
US7197644B2 (en) * 2002-12-16 2007-03-27 Xerox Corporation Systems and methods for providing hardcopy secure documents and for validation of such documents
US8745409B2 (en) * 2002-12-18 2014-06-03 Sandisk Il Ltd. System and method for securing portable data
US20050044413A1 (en) * 2003-02-05 2005-02-24 Accenture Global Services Gmbh Secure electronic registration and voting solution
WO2005008399A2 (en) * 2003-07-09 2005-01-27 Cross Match Technologies, Inc. Systems and methods for facilitating transactions
US7278028B1 (en) * 2003-11-05 2007-10-02 Evercom Systems, Inc. Systems and methods for cross-hatching biometrics with other identifying data
US7164907B2 (en) * 2004-01-13 2007-01-16 Qualcomm Inc. Automated over the air plug-in device recognition and software driver download
US20050210270A1 (en) * 2004-03-19 2005-09-22 Ceelox, Inc. Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation
US20050216830A1 (en) * 2004-03-29 2005-09-29 Turner Jeffrey S Access tool to facilitate exchange of data to and from an end-user application software package
US7437358B2 (en) * 2004-06-25 2008-10-14 Apple Inc. Methods and systems for managing data
US7155040B2 (en) * 2004-06-29 2006-12-26 Bio-Key International, Inc. Generation of quality field information in the context of image processing
US8055027B2 (en) * 2004-06-30 2011-11-08 Bio-Key International, Inc. Generation of directional field information in the context of image processing
US7474769B1 (en) * 2004-09-14 2009-01-06 Unisys Corporation Bioindex mechanism for increasing the relative speed of biometric identification against large population samples
US8402141B2 (en) * 2004-09-28 2013-03-19 International Business Machines Corporation Gracefully reestablishing an expired browser session
US8027982B2 (en) * 2006-03-01 2011-09-27 Oracle International Corporation Self-service sources for secure search
US8005816B2 (en) * 2006-03-01 2011-08-23 Oracle International Corporation Auto generation of suggested links in a search system
US8001387B2 (en) * 2006-04-19 2011-08-16 Dphi, Inc. Removable storage medium with biometric access
US7962755B2 (en) * 2006-04-28 2011-06-14 Ceelox, Inc. System and method for biometrically secured, transparent encryption and decryption
US7818395B2 (en) * 2006-10-13 2010-10-19 Ceelox, Inc. Method and apparatus for interfacing with a restricted access computer system
US8255698B2 (en) * 2008-12-23 2012-08-28 Motorola Mobility Llc Context aware biometric authentication
JP2010157867A (en) * 2008-12-26 2010-07-15 Visionere Corp Dynamic image reproduction code generation device, dynamic image distribution system, execution format program, recording medium containing the program, server, and dynamic image reproduction code generation method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5774652A (en) * 1995-09-29 1998-06-30 Smith; Perry Restricted access computer system
US6321334B1 (en) * 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US20050149742A1 (en) * 2003-11-06 2005-07-07 Alcatel Biometric access method

Also Published As

Publication number Publication date
US8799407B2 (en) 2014-08-05
US20170302453A1 (en) 2017-10-19
TWI353522B (en) 2011-12-01
US20160204943A1 (en) 2016-07-14
US7818395B2 (en) 2010-10-19
TW200834315A (en) 2008-08-16
US20120072724A1 (en) 2012-03-22
US20080091833A1 (en) 2008-04-17
US20140359284A1 (en) 2014-12-04
US8429246B2 (en) 2013-04-23
US20110035598A1 (en) 2011-02-10
US9473305B2 (en) 2016-10-18
US9172700B2 (en) 2015-10-27
US10142110B2 (en) 2018-11-27
US20130238908A1 (en) 2013-09-12
US8051142B2 (en) 2011-11-01
WO2008070263A2 (en) 2008-06-12

Similar Documents

Publication Publication Date Title
WO2008070263A3 (en) Method and apparatus for interfacing with a restricted access computer system
WO2006113418A3 (en) Apparatus and process for a universal diagnostic monitor module on a wireless device
WO2007124206A3 (en) System and method for securing information in a virtual computing environment
TW200511033A (en) Implementing a second computer system as an interface for a first computer system
WO2005074397A3 (en) Computer security apparatus and method using security input device driver
WO2006076538A3 (en) System and method for remotely controlling docking station components
WO2008070172A3 (en) Apparatus, system, and method for remote direct memory access to a solid-state storage device
WO2005018166A3 (en) Technique to coordinate servicing of multiple network interfaces.
WO2007005046A3 (en) System and method for communicating with memory devices
PL1715395T3 (en) System for secure remote access
TW200713053A (en) Method and computer system for securing backup data from damage by virus and hacker program
WO2008016489A3 (en) Methods and systems for modifying an integrity measurement based on user athentication
TW200632747A (en) Method and apparatus for controlling a user interface of a consumer electronic device
WO2006041803A3 (en) Communication network
GB2397910B (en) Methods and apparatus for rapidly activating inactive components in a computer system
WO2006019682A3 (en) Host credentials authorization protocol
TW200604825A (en) Apparatus and method of establishing data transmission speed for serial advanced technology attachment interface
WO2006065399A3 (en) Using trend data to address computer faults
WO2007141780A3 (en) A system and method for software application remediation
AU2001225358A1 (en) Method and apparatus for increasing the battery life of portable electronic devices
WO2007049109A3 (en) Method and system for compression of logical data objects for storage
EP2296099A3 (en) Information processing apparatus, information processing system, utilization constraint method, utilization constraint program, and recording medium storing the program
WO2004040821A3 (en) Handling files operated on physically different computers
TW200513949A (en) Information processing device and information processing terminal
AU2003207529A1 (en) Method and system for monitoring dma status in a computer system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07871120

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07871120

Country of ref document: EP

Kind code of ref document: A2