Chris Burchett - Lewisville TX, US Warren Robbins - Celina TX, US Jason Jaynes - Austin TX, US Brijesh Mishra - Wylie TX, US
Assignee:
Credant Technologies, Inc. - Addison TX
International Classification:
G06F 17/30
US Classification:
726008000
Abstract:
This present invention provides a system and method making it possible for a third party add-on system to keep user authentication credentials synchronized with an existing user authentication mechanism.
Warren Robbins - Celina TX, US James Michael Burke - Frisco TX, US James Darrell Testerman - McKinney TX, US David Albert Consolver - Dallas TX, US
Assignee:
Dell Inc. - Round Rock TX
International Classification:
G06F 17/30
US Classification:
707754, 707756
Abstract:
Embodiments of methods, systems, and services for transparent adaptive file transform are described. In one embodiment a method for transparent adaptive file transform is performed by a data processing device. The method may include automatically detecting a data transfer addressed to an external data storage. The method may also include redirecting data associated with the data transfer to a data transformer. Additionally, the method may include applying one or more data transforms to the data associated with the data transfer to generate a transformed data set. In an embodiment, the method may also include transferring the transformed data set to the external data storage. In one embodiment, the external data storage is a cloud storage facility.
Warren Robbins - Celina TX, US Richard E. Phillips - Lewisville TX, US
International Classification:
H04L 9/32
US Classification:
713185
Abstract:
Embodiments of systems and methods for providing anonymous cloud encryption are provided. One embodiment of a method for providing anonymous cloud encryption includes communicating an anonymizing token to a key broker. Additionally, the method may include communicating at least one encryption key associated with the anonymizing token to the key broker. The method may also include conducting a secure anonymous transaction with a cloud service using at least one of the encryption keys associated with the anonymizing token.
Transferable Ownership Tokens For Discrete, Identifiable Devices
- Round Rock TX, US Daniel L. HAMLIN - Round Rock TX, US Warren Wade ROBBINS - Celina TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04W 12/08 H04L 29/06 H04L 29/08 H04W 4/00
Abstract:
A mobile device that includes an ownership token application program receives user input indicative of a first authentication factor associated with an ownership token bound to an Internet of Things (IoT) device. Responsive to detecting the IoT device in close proximity, the mobile device may obtain a second authentication factor and an IoT device identifier from the IoT device. The mobile device may then provide the obtained factors as authenticating credentials to a token server via a trust application program interface (API). After the server authenticates the mobile device, the server may send the token to the mobile device thereby transferring ownership rights, including access rights, to recipient. The application program and/or the trust API may be configured for one-time access wherein, after the token has been transferred to the mobile device. The discrete electronic device may comprise an Internet of Things (IoT device) that supports wireless, near field communication.
Systems and methods for distributed authorization are described. In some embodiments, an Information Handling System (IHS) may include a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution, cause the IHS to: receive a first authentication material from a first device; identify, based upon a policy stored in the IHS, a second device; and distribute a second authentication material to the second device.
Managed Software As A Service Deployment Utilizing A Client Key To Generate A One-Time Use Reference For Delivery
- Round Rock TX, US Warren W. Robbins - Celina TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
G06F 9/445 H04L 29/08 H04L 29/06
Abstract:
A system, method, and computer-readable medium for performing a secure userless device software deployment operation. The secure userless device software deployment operation enables a client information handing system and a server information handling system to independently and deterministically construct a host reference (such as a host universal resource locator (URL)). In certain embodiments, the host reference is used for the SaaS connection based on a fixed portion plus a unique portion created using a client's public key as an identifier. In certain embodiments, the secure userless device software deployment operation leverages a management system to broker a SaaS service deployment. In certain embodiments, the secure userless device software deployment operation securely attaches a managed userless device to a tenant based SaaS offering by leveraging a connection plug-in and temporary/ephemeral URL architecture with a one-time use construct.
- San Jose CA, US Oleg Rombakh - Los Gatos CA, US James Burke - Frisco TX, US Darrell Testerman - McKinney TX, US Chris Burchett - Lewisville TX, US Warren Robbins - Celina TX, US
International Classification:
G06F 21/62 G06F 21/53 H04L 29/06 H04L 29/08
Abstract:
A secure access client can be employed to enforce limitations on a user's access to a file while also allowing the user to access the file using an application of choice. To provide this functionality, the secure access client can implement an RDP client that is configured to create an RDP session with an RDP service executing on the same computing device. The RDP service can allow the secure access client to display the user interface of an application employed to open a file. The secure access client can be configured to selectively apply access limitations on a per file basis. This selective enforcement can be accomplished by only implementing a virtual channel extension to provide a particular type of access to the file when the file's access limitations would allow such access.
Mobile Device Management Delegate For Managing Isolated Devices
- Round Rock TX, US Warren W. Robbins - Celina TX, US
Assignee:
Dell Products L.P. - Round Rock TX
International Classification:
H04L 9/08 H04L 29/06
Abstract:
A device manager establishes a mobile device and a gateway as managed devices. The device manager generates management metadata and a split cryptographic key. The management metadata may include information identifying the mobile device. The metadata may include a gateway key part and a mobile key part which, in combination, are sufficient to decrypt information encrypted with the management split key. The device manager may encrypt the management metadata using the management split key. The device manager may send the gateway key part and the encrypted management metadata to the gateway and the mobile key part to the mobile device. Subsequent delivery of the mobile key part to the gateway, by the mobile device, enables the gateway to decrypt the encrypted management metadata and recognize the mobile device as a management device delegate sanctioned by the device manager to perform delegated management of the gateway.
Warren M. Robbins. From Wikipedia, the free encyclopedia. Jump to: navigation, search. Warren Murray Robbins (September 4, 1923 - December 4, 2008) was ...