Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Combining a mobile device and computer to create a secure personalized environment

A technology of mobile devices and computers, applied in various digital computer combinations, platform integrity maintenance, instruments, etc., can solve problems such as endangering security, vulnerability of enterprise networks, and management.

Active Publication Date: 2015-05-20
MICROSOFT TECH LICENSING LLC
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently, publicly accessible computers cannot be managed as normal corporate assets, which can cause application incompatibility issues, unavailability of required resources, loss of data integrity, and vulnerability to malware for traveling corporate users s consequence
The corporate network itself becomes vulnerable if a corporate user brings back to the office eg bad software (i.e. malware) on a storage medium, or if a user emails a compromised or damaged file from a public computer to a corporate server and risk to safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combining a mobile device and computer to create a secure personalized environment
  • Combining a mobile device and computer to create a secure personalized environment
  • Combining a mobile device and computer to create a secure personalized environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] figure 1 An exemplary computing environment 100 including a mobile device 105 and a PC 110 is shown. The mobile device 105 may be selected from one of a number of different devices including, for example, mobile phones, smart phones, pocket PCs, PDAs (Personal Digital Assistants), such as MP3 (Moving Picture Experts Group, MPEG-1, audio Layer 3) Players Personal media players, digital cameras, digital video recorders, handheld gaming devices, devices that incorporate one or more of the above functions, etc. Typically, mobile device 105 will be compact and lightweight, enabling it to be conveniently carried by user 112 from one place to another. An on-board power source, such as a battery in the mobile device 105, is also typically provided to further increase the usefulness and functionality of the device.

[0016] PC 110 represents a computing platform such as a desktop PC, laptop PC, workstation, and the like. In this particular example, computing environment 100 a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A mobile device, such as a mobile phone, smart phone, personal music player, handheld game device, and the like, when operatively combined with a PC, creates a secure and personalized computing platform through configuration of the mobile device's CPU (central processing unit) and OS (operating system) to function as an immutable trusted core. The trusted core in the mobile device verifies the integrity of the PC including, for example, that its drivers, applications, and other software are trusted and unmodified, and thus safe to use without presenting a threat to the integrity of the combined computing platform. The mobile device can further optionally store and transport the user's personalization data-including, for example, the user's desktop, applications, data, certificates, settings, and preferences-which can be accessed by the PC when the devices are combined to thus create a personalized computing environment.

Description

Background technique [0001] Computing resources, such as personal computers ("PCs"), in home and office environments are generally protected against attacks and unauthorized access by various effective security techniques and products. However, today's computer users are often traveling in an environment where they often encounter publicly accessible computers such as those located in kiosks, Internet cafés, or hotel lobbies. Providing security for these publicly accessible computers is often a significant challenge. Their users risk data loss, downtime, and loss of labor that compromises the integrity of the computer. [0002] Corporate users often have to forego the benefits they normally enjoy in their secure corporate environment when traveling to use public computing resources. Currently, publicly accessible computers cannot be managed as normal corporate assets, which can cause application incompatibility issues, unavailability of required resources, loss of data integ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F15/16
CPCG06F21/53G06F21/57G06F2221/2149G06F2221/2153H04L63/102H04L63/1433
Inventor N·奈斯H·菲图西
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products