Non-obtrusive security system for devices
First Claim
Patent Images
1. A computer-implemented method comprising:
- initiating a computing device including an installed security agent;
using, in a first instance, the security agent to retrieve stored first authentication data;
pre-authenticating the computing device using the retrieved first authentication data;
using the security agent to replace the first authentication data with second authentication data without knowledge of users of the computing device; and
communicating the replacement of the first authentication data with second authentication data to a remote server.
8 Assignments
0 Petitions
Accused Products
Abstract
A security system is provided including providing a device including: storing a security rule for operation of the device when an event occurs; and implementing the security rule upon the occurrence of the event to allow non-obtrusive user access to the device.
-
Citations
39 Claims
-
1. A computer-implemented method comprising:
-
initiating a computing device including an installed security agent; using, in a first instance, the security agent to retrieve stored first authentication data; pre-authenticating the computing device using the retrieved first authentication data; using the security agent to replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicating the replacement of the first authentication data with second authentication data to a remote server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer-implemented method comprising:
-
authenticating a computing device, in a first instance, using first authentication data managed by security agent, the security agent enabled to change at least a portion of the first authentication data without the knowledge of users of the computing device; authenticating the computing device, in a second, other instance, using second authentication data received from a user of the computing device in response to an authentication prompt; wherein authenticating the computing device grants users access to the computing device and changes to the authentication data by the security agent are communicated to a remote server. - View Dependent Claims (26, 27, 28)
-
-
29. An apparatus comprising:
-
at least one processor; at least one computer-readable medium; and a security agent operating on the apparatus to; retrieve stored first authentication data; pre-authenticate the computing device using the retrieved first authentication data; replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicate the replacement of the first authentication data with second authentication data to a remote server associated with a trusted authority; wherein at least one user is granted access to the computing device based on pre-authentication of the computing device. - View Dependent Claims (30, 31, 32, 33)
-
-
34. An apparatus comprising:
-
at least one processor; at least one computer-readable medium; and at least one security management module operating on the apparatus to; pre-authenticate the apparatus, in a first instance, using first authentication data; change at least a portion of the first authentication data without the knowledge of users of the apparatus; and authenticate the apparatus, in a second, other instance, using second authentication data received from a user of the apparatus in response to an authentication prompt; wherein authenticating the apparatus grants users access to the apparatus and changes to the authentication data are communicated to a remote server associated with a trusted authority. - View Dependent Claims (35, 36, 37, 38)
-
-
39. An article comprising a non-transitory, machine-readable storage device storing instructions operable to cause at least one processor to perform operations comprising:
-
initiating a computing device including an installed security agent; using, in a first instance, a security agent installed on a computing device to retrieve stored first authentication data; pre-authenticating the computing device using the retrieved first authentication data; using the security agent to replace the first authentication data with second authentication data without knowledge of users of the computing device; and communicating the replacement of the first authentication data with second authentication data to a remote server.
-
Specification