NON-OBTRUSIVE SECURITY SYSTEM FOR DEVICES
8 Assignments
0 Petitions
Accused Products
Abstract
A security system is provided including providing a device including: storing a security rule for operation of the device when an event occurs; and implementing the security rule upon the occurrence of the event to allow non-obtrusive user access to the device.
-
Citations
59 Claims
-
1-20. -20. (canceled)
-
21. A computer-implemented method comprising:
-
initiating a computing device including an installed security agent; using, in a first instance, the security agent to retrieve stored first authentication data; pre-authenticating the computing device using the retrieved first authentication data; using the security agent to replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicating the replacement of the first authentication data with second authentication data to a remote server. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A computer-implemented method comprising:
-
authenticating a computing device, in a first instance, using first authentication data managed by security agent, the security agent enabled to change at least a portion of the first authentication data without the knowledge of users of the computing device; authenticating the computing device, in a second, other instance, using second authentication data received from a user of the computing device in response to an authentication prompt; wherein authenticating the computing device grants users access to the computing device and changes to the authentication data by the security agent are communicated to a remote server. - View Dependent Claims (46, 47, 48)
-
-
49. An apparatus comprising:
-
at least one processor; at least one computer-readable medium; and a security agent operating on the apparatus to; retrieve stored first authentication data; pre-authenticate the computing device using the retrieved first authentication data; replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicate the replacement of the first authentication data with second authentication data to a remote server associated with a trusted authority; wherein at least one user is granted access to the computing device based on pre-authentication of the computing device. - View Dependent Claims (50, 51, 52, 53)
-
-
54. An apparatus comprising:
-
at least one processor; at least one computer-readable medium; and at least one security management module operating on the apparatus to; pre-authenticate the apparatus, in a first instance, using first authentication data; change at least a portion of the first authentication data without the knowledge of users of the apparatus; and authenticate the apparatus, in a second, other instance, using second authentication data received from a user of the apparatus in response to an authentication prompt; wherein authenticating the apparatus grants users access to the apparatus and changes to the authentication data are communicated to a remote server associated with a trusted authority. - View Dependent Claims (55, 56, 57, 58)
-
-
59. An article comprising a non-transitory, machine-readable storage device storing instructions operable to cause at least one processor to perform operations comprising:
-
initiating a computing device including an installed security agent; using, in a first instance, a security agent installed on a computing device to retrieve stored first authentication data; pre-authenticating the computing device using the retrieved first authentication data; using the security agent to replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicating the replacement of the first authentication data with second authentication data to a remote server.
-
Specification