US20070300312A1 - User presence detection for altering operation of a computing system - Google Patents
User presence detection for altering operation of a computing system Download PDFInfo
- Publication number
- US20070300312A1 US20070300312A1 US11/472,575 US47257506A US2007300312A1 US 20070300312 A1 US20070300312 A1 US 20070300312A1 US 47257506 A US47257506 A US 47257506A US 2007300312 A1 US2007300312 A1 US 2007300312A1
- Authority
- US
- United States
- Prior art keywords
- computer
- user
- service
- absence
- present
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 14
- 238000000034 method Methods 0.000 claims abstract description 49
- 230000002708 enhancing effect Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 21
- 238000010586 diagram Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- Various technologies and techniques are disclosed that modify a status of a computer system based on user presence detection.
- One or more input devices such as a keyboard, mouse, camera, etc. detect whether a user is present.
- the operation of an application is adjusted based on whether or not the user is present.
- services can be disabled to increase security, a logging operation can be increased, a service that was previously disabled can be enabled, at least one system feature based on a number of users present can be adjusted, etc.
- the system if the user is detected to be absent, then the system disables at least one system service that does not need to be enabled while the user is absent to increase the security state of the computer.
- an attack directory is accessed to retrieve information about the most likely services to be attacked, and that information is used to help determine what services to disable to increase the security of the computer system.
- FIG. 1 is a diagrammatic view of a computer system of one implementation.
- FIG. 2 is a diagrammatic view of a user presence detection application of one implementation operating on the computer system of FIG. 1 .
- FIG. 3 is a process flow diagram for one implementation of the system of FIG. 1 illustrating the stages involved in detecting the presence or absence of one or more users and adjusting the security and/or other system features accordingly.
- FIG. 4 is a process flow diagram for one implementation of the system of FIG. 1 illustrating the stages involved in detecting the presence or absence of one or more users.
- FIG. 5 is a process flow diagram for one implementation of the system of FIG. 1 illustrating the stages involved in adjusting certain features to change security based on the absence or presence of a user.
- FIG. 6 is a process flow diagram for one implementation of the system of FIG. 1 that illustrates the stages involved in adjusting voice-over-IP functionality based on the absence or presence of a user.
- FIG. 7 is a process flow diagram for one implementation of the system of FIG. 1 that illustrates the stages involved in adjusting file-sharing functionality based on the absence or presence of a user.
- FIG. 8 is a process flow diagram for one implementation of the system of FIG. 1 that illustrates the stages involved in accessing an external attacks service/directory to help determine security adjustments to make based on user presence or absence.
- FIG. 9 is a process flow diagram for one implementation of the system of FIG. 1 that illustrates the stages involved in adjusting the operation of one or more applications based on the classification(s) of users present.
- the system may be described in the general context as an application that adjusts a system operation based on the presence or absence of a user, but the system also serves other purposes in addition to these.
- one or more of the techniques described herein can be implemented as features within an operating system such as MICROSOFT® WINDOWS ®, or from any other type of program or service that uses the presence or absence of a user to make adjustments to the operation of one or more applications and/or services on a computing device.
- an exemplary computer system to use for implementing one or more parts of the system includes a computing device, such as computing device 100 .
- computing device 100 In its most basic configuration, computing device 100 typically includes at least one processing unit 102 and memory 104 .
- memory 104 may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.) or some combination of the two.
- This most basic configuration is illustrated in FIG. 1 by dashed line 106 .
- device 100 may also have additional features/functionality.
- device 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape.
- additional storage is illustrated in FIG. 1 by removable storage 108 and non-removable storage 110 .
- Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Memory 104 , removable storage 108 and non-removable storage 110 are all examples of computer storage media.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by device 100 . Any such computer storage media may be part of device 100 .
- Computing device 100 includes one or more communication connections 114 that allow computing device 100 to communicate with other computers/applications 115 .
- Device 100 may also have input device(s) 112 such as keyboard, mouse, pen, voice input device, touch input device, etc.
- Output device(s) 111 such as a display, speakers, printer, etc. may also be included. These devices are well known in the art and need not be discussed at length here.
- computing device 100 includes user presence detection application 200 .
- user presence detection application 200 communicates with a current attacks service/directory 113 over other communication connection(s) 114 . User presence detection application 200 will be described in further detail in FIG. 2 .
- User presence detection application 200 is one of the application programs that reside on computing device 100 .
- user presence detection application 200 can alternatively or additionally be embodied as computer-executable instructions on one or more computers and/or in different variations than shown on FIG. 1 .
- one or more parts of user presence detection application 200 can be part of system memory 104 , on other computers and/or applications 115 , or other such variations as would occur to one in the computer software art.
- User presence detection application 200 includes program logic 204 , which is responsible for carrying out some or all of the techniques described herein.
- Program logic 204 includes logic for using one or more input devices (e.g. keyboard, mouse, camera, sensor, etc.) to detect the presence or absence of one or more users 206 ; logic for adjusting the operation of one or more applications based on user absence (e.g. disabling certain ports/services to increase security, increase logging, etc.) 208 ; logic for adjusting the operation of one or more applications based on user presence (e.g. enable/re-enable certain ports/services to allow more operations and/or adjust operations appropriately based on number of users present, class/demographics of users present (e.g.
- program logic 204 is operable to be called programmatically from another program, such as using a single call to a procedure in program logic 204 .
- FIG. 3 illustrates one implementation of the stages involved in detecting the presence or absence of one or more users and adjusting the security and/or other system features accordingly.
- the process of FIG. 3 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 240 with using one or more input devices (e.g. keyboard, mouse, camera, sensor, etc.) to detect the presence or absence of one or more users (stage 242 ). Is the user absent (e.g. no one currently using the system) (decision point 244 ), then the system adjusts the operation of one or more services and/or applications accordingly for user absence (e.g. disables certain system services, disables certain ports to increase security, increases logging, etc.) (stage 246 ). If one or more users are present (e.g. the user is not absent) (decision point 244 ), then the system adjusts the operation of one or more applications accordingly for user presence and/or based on classification/demographics of user(s) present (e.g. enables certain ports to allow more operations if an adult is present with a child, allows more features to be used than if just one or more children present, etc.) (stage 248 ). The process ends at end point 250 .
- input devices e.g. keyboard, mouse
- FIG. 4 illustrates one implementation of the stages involved in detecting the presence or absence of one or more users.
- the process of FIG. 4 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 270 with detecting a change in the status of a user's presence (one or more users present or absent) (stage 272 ).
- the changes in the user(s) status are analyzed (e.g. the number of users present, demographics of user(s) present and/or whether they are looking at the computer or not) (stage 274 ).
- the operation of one or more applications is adjusted accordingly (e.g. system switched to a heightened security mode, a reduced security mode, and/or others) (stage 276 ).
- stage 278 The process ends at end point 278 .
- FIG. 5 illustrates one implementation of the stages involved in adjusting certain features to change security based on the absence or presence of a user.
- the process of FIG. 5 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 290 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 292 ).
- the system disables one or more ports and/or services on the system that do not need to be enabled while the user is absent (e.g. such as those an external attack service/directory lists as the most likely ports and/or services to be attacked) (stage 294 ).
- stage 296 Other features and/or systems are disabled and/or modified as appropriate given the user's absence (e.g. increase system logging, etc.) (stage 296 ).
- stage 298 The presence of a user is detected from the computer system (e.g. the user returned, or a different user comes) (stage 298 ).
- stage 300 The ports and/or services that were previously disabled are re-enabled and other features/systems previously adjusted due to user's absence are also restored (stage 300 ).
- stage 300 The process ends at end point 302 .
- FIG. 6 illustrates one implementation of the stages involved in adjusting voice-over-IP functionality based on the absence or presence of a user.
- the process of FIG. 6 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 310 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 312 ).
- the voice-over-IP port(s) and/or services are disabled so incoming calls will not be allowed (since user would not answer) (stage 314 ).
- a voice-over-IP server (separate from user's computer system) can optionally send any incoming calls to voice mail (stage 316 ).
- stage 318 the presence of a user is detected from the computer system.
- the ports and/or services that were previously disabled are re-enabled so voice-over-IP services are restored (e.g. so the user can receive calls) (stage 320 ).
- the process ends at end point 322 .
- FIG. 7 illustrates one implementation of the stages involved in adjusting file-sharing functionality based on the absence or presence of a user.
- the process of FIG. 7 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 340 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 342 ).
- Certain file sharing ports and/or services are disabled or enabled appropriately based on the user's absence (stage 344 ).
- the system may disable certain file sharing such as peer-to-peer file sharing that should not be allowed while the user is away, and/or the system may enable certain file sharing ports that should only be allowed when the user is away (e.g. for external access to the data) (stage 344 ).
- the presence of a user is detected from the computer system (stage 346 ).
- the ports and/or services that were previously changed are re-enabled or disabled accordingly so file-sharing is returned to the prior state (stage 348 ).
- the process ends at end point 350 .
- FIG. 8 illustrates one implementation of the stages involved in accessing an external attacks service/directory to help determine security adjustments to make based on user presence or absence.
- the process of FIG. 8 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 370 with accessing an external attacks service/directory (e.g. using a web service, etc.) to determine the most likely ports and/or services to be attacked on a computer (e.g. at a particular moment) (stage 372 ).
- the ports and/or services that the external directory indicated were the highest targets are disabled (stage 374 ).
- the system re-enables the ports and/or services that were disabled, but optionally monitors their activity with heightened awareness of the security risk (stage 376 ).
- stage 378 ends at end point 378 .
- FIG. 9 illustrates one implementation of the stages involved in adjusting the operation of one or more applications based on the classification(s) of users present.
- the process of FIG. 9 is at least partially implemented in the operating logic of computing device 100 .
- the procedure begins at start point 390 with using one or more input devices (e.g. camera, sensor, keyboard, etc.) to determine that one or more users are present (stage 392 ).
- the system determines the classification(s)/demographic(s) associated with the one or more users present (e.g. adult, minor child, male, female, etc.) (stage 394 ).
- the operation of one or more applications is adjusted based on the classification(s)/demographic(s) of users present (stage 396 ).
- the system can increase a logging operation and/or disable at least one feature of one or more applications if a minor child is present, etc. (stage 396 ).
- the process ends at end point 398 .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Various technologies and techniques are disclosed that modify a computer system based on user presence detection. An input device detects whether a user is present and adjusts the operation of an application accordingly. For example, ports or services can be disabled to increase security, a logging operation can be increased, a port or service that was previously disabled can be enabled, at least one system feature based on a number of users present can be adjusted, etc. If the user is detected to be absent, for example, then the system can disable at least one system port or service that does not need to be enabled while the user is absent to increase the security state of the computer. An attack directory can be accessed to retrieve information about the most likely services to be attacked, and that information can be used to help determine what services to disable.
Description
- In many cases, personal computers are powered up for continuous, long periods of time while users typically use them during a small fraction of the power-on time. Applications such as voice-over-IP, peer-to-peer networking, networked video games, and messaging require incoming traffic into a personal computer in order to provide their services. Since firewalls are not impenetrable, such traffic is cause to most system vulnerabilities. Attacks are usually launched by scanning through series of active IP addresses, and the more that incoming traffic is allowed on a given computer, the more likely it is that the computer will be attacked.
- Various technologies and techniques are disclosed that modify a status of a computer system based on user presence detection. One or more input devices (such as a keyboard, mouse, camera, etc.) detect whether a user is present. The operation of an application is adjusted based on whether or not the user is present. As a few non-limiting examples, services can be disabled to increase security, a logging operation can be increased, a service that was previously disabled can be enabled, at least one system feature based on a number of users present can be adjusted, etc. In one implementation, if the user is detected to be absent, then the system disables at least one system service that does not need to be enabled while the user is absent to increase the security state of the computer. In another implementation, an attack directory is accessed to retrieve information about the most likely services to be attacked, and that information is used to help determine what services to disable to increase the security of the computer system.
- This Summary was provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.
-
FIG. 1 is a diagrammatic view of a computer system of one implementation. -
FIG. 2 is a diagrammatic view of a user presence detection application of one implementation operating on the computer system ofFIG. 1 . -
FIG. 3 is a process flow diagram for one implementation of the system ofFIG. 1 illustrating the stages involved in detecting the presence or absence of one or more users and adjusting the security and/or other system features accordingly. -
FIG. 4 is a process flow diagram for one implementation of the system ofFIG. 1 illustrating the stages involved in detecting the presence or absence of one or more users. -
FIG. 5 is a process flow diagram for one implementation of the system ofFIG. 1 illustrating the stages involved in adjusting certain features to change security based on the absence or presence of a user. -
FIG. 6 is a process flow diagram for one implementation of the system ofFIG. 1 that illustrates the stages involved in adjusting voice-over-IP functionality based on the absence or presence of a user. -
FIG. 7 is a process flow diagram for one implementation of the system ofFIG. 1 that illustrates the stages involved in adjusting file-sharing functionality based on the absence or presence of a user. -
FIG. 8 is a process flow diagram for one implementation of the system ofFIG. 1 that illustrates the stages involved in accessing an external attacks service/directory to help determine security adjustments to make based on user presence or absence. -
FIG. 9 is a process flow diagram for one implementation of the system ofFIG. 1 that illustrates the stages involved in adjusting the operation of one or more applications based on the classification(s) of users present. - For the purposes of promoting an understanding of the principles of the invention, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope is thereby intended. Any alterations and further modifications in the described embodiments, and any further applications of the principles as described herein are contemplated as would normally occur to one skilled in the art.
- The system may be described in the general context as an application that adjusts a system operation based on the presence or absence of a user, but the system also serves other purposes in addition to these. In one implementation, one or more of the techniques described herein can be implemented as features within an operating system such as MICROSOFT® WINDOWS ®, or from any other type of program or service that uses the presence or absence of a user to make adjustments to the operation of one or more applications and/or services on a computing device.
- As shown in
FIG. 1 , an exemplary computer system to use for implementing one or more parts of the system includes a computing device, such ascomputing device 100. In its most basic configuration,computing device 100 typically includes at least oneprocessing unit 102 andmemory 104. Depending on the exact configuration and type of computing device,memory 104 may be volatile (such as RAM), non-volatile (such as ROM, flash memory, etc.) or some combination of the two. This most basic configuration is illustrated inFIG. 1 bydashed line 106. - Additionally,
device 100 may also have additional features/functionality. For example,device 100 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Such additional storage is illustrated inFIG. 1 byremovable storage 108 andnon-removable storage 110. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.Memory 104,removable storage 108 andnon-removable storage 110 are all examples of computer storage media. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed bydevice 100. Any such computer storage media may be part ofdevice 100. -
Computing device 100 includes one ormore communication connections 114 that allowcomputing device 100 to communicate with other computers/applications 115.Device 100 may also have input device(s) 112 such as keyboard, mouse, pen, voice input device, touch input device, etc. Output device(s) 111 such as a display, speakers, printer, etc. may also be included. These devices are well known in the art and need not be discussed at length here. In one implementation,computing device 100 includes userpresence detection application 200. In one implementation, userpresence detection application 200 communicates with a current attacks service/directory 113 over other communication connection(s) 114. Userpresence detection application 200 will be described in further detail inFIG. 2 . - Turning now to
FIG. 2 with continued reference toFIG. 1 , a userpresence detection application 200 operating oncomputing device 100 is illustrated. Userpresence detection application 200 is one of the application programs that reside oncomputing device 100. However, it will be understood that userpresence detection application 200 can alternatively or additionally be embodied as computer-executable instructions on one or more computers and/or in different variations than shown onFIG. 1 . Alternatively or additionally, one or more parts of userpresence detection application 200 can be part ofsystem memory 104, on other computers and/orapplications 115, or other such variations as would occur to one in the computer software art. - User
presence detection application 200 includesprogram logic 204, which is responsible for carrying out some or all of the techniques described herein.Program logic 204 includes logic for using one or more input devices (e.g. keyboard, mouse, camera, sensor, etc.) to detect the presence or absence of one ormore users 206; logic for adjusting the operation of one or more applications based on user absence (e.g. disabling certain ports/services to increase security, increase logging, etc.) 208; logic for adjusting the operation of one or more applications based on user presence (e.g. enable/re-enable certain ports/services to allow more operations and/or adjust operations appropriately based on number of users present, class/demographics of users present (e.g. age, gender, etc.), and/or whether users are looking at computer or not) 210; logic for accessing an attack service/directory to determine the most likely ports/services to be attacked 212; logic for using the information retrieved from the attack directory to help make security adjustments based on user presence and/orabsence 214; and other logic for operating theapplication 220. In one implementation,program logic 204 is operable to be called programmatically from another program, such as using a single call to a procedure inprogram logic 204. - Turning now to
FIGS. 3-8 with continued reference toFIGS. 1-2 , the stages for implementing one or more implementations of userpresence detection application 200 are described in further detail.FIG. 3 illustrates one implementation of the stages involved in detecting the presence or absence of one or more users and adjusting the security and/or other system features accordingly. In one form, the process ofFIG. 3 is at least partially implemented in the operating logic ofcomputing device 100. - The procedure begins at
start point 240 with using one or more input devices (e.g. keyboard, mouse, camera, sensor, etc.) to detect the presence or absence of one or more users (stage 242). Is the user absent (e.g. no one currently using the system) (decision point 244), then the system adjusts the operation of one or more services and/or applications accordingly for user absence (e.g. disables certain system services, disables certain ports to increase security, increases logging, etc.) (stage 246). If one or more users are present (e.g. the user is not absent) (decision point 244), then the system adjusts the operation of one or more applications accordingly for user presence and/or based on classification/demographics of user(s) present (e.g. enables certain ports to allow more operations if an adult is present with a child, allows more features to be used than if just one or more children present, etc.) (stage 248). The process ends at end point 250. -
FIG. 4 illustrates one implementation of the stages involved in detecting the presence or absence of one or more users. In one form, the process ofFIG. 4 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 270 with detecting a change in the status of a user's presence (one or more users present or absent) (stage 272). The changes in the user(s) status are analyzed (e.g. the number of users present, demographics of user(s) present and/or whether they are looking at the computer or not) (stage 274). The operation of one or more applications is adjusted accordingly (e.g. system switched to a heightened security mode, a reduced security mode, and/or others) (stage 276). The process ends atend point 278. -
FIG. 5 illustrates one implementation of the stages involved in adjusting certain features to change security based on the absence or presence of a user. In one form, the process ofFIG. 5 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 290 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 292). The system disables one or more ports and/or services on the system that do not need to be enabled while the user is absent (e.g. such as those an external attack service/directory lists as the most likely ports and/or services to be attacked) (stage 294). Other features and/or systems are disabled and/or modified as appropriate given the user's absence (e.g. increase system logging, etc.) (stage 296). The presence of a user is detected from the computer system (e.g. the user returned, or a different user comes) (stage 298). The ports and/or services that were previously disabled are re-enabled and other features/systems previously adjusted due to user's absence are also restored (stage 300). The process ends atend point 302. -
FIG. 6 illustrates one implementation of the stages involved in adjusting voice-over-IP functionality based on the absence or presence of a user. In one form, the process ofFIG. 6 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 310 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 312). The voice-over-IP port(s) and/or services are disabled so incoming calls will not be allowed (since user would not answer) (stage 314). A voice-over-IP server (separate from user's computer system) can optionally send any incoming calls to voice mail (stage 316). At a later time, the presence of a user is detected from the computer system (stage 318). The ports and/or services that were previously disabled are re-enabled so voice-over-IP services are restored (e.g. so the user can receive calls) (stage 320). The process ends atend point 322. -
FIG. 7 illustrates one implementation of the stages involved in adjusting file-sharing functionality based on the absence or presence of a user. In one form, the process ofFIG. 7 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 340 with detecting the absence of a user from the computer system (e.g. no keyboard and/or mouse activity for a certain period of time, camera shows no one present, etc.) (stage 342). Certain file sharing ports and/or services are disabled or enabled appropriately based on the user's absence (stage 344). As a few non-limiting examples, the system may disable certain file sharing such as peer-to-peer file sharing that should not be allowed while the user is away, and/or the system may enable certain file sharing ports that should only be allowed when the user is away (e.g. for external access to the data) (stage 344). At a later time, the presence of a user is detected from the computer system (stage 346). The ports and/or services that were previously changed are re-enabled or disabled accordingly so file-sharing is returned to the prior state (stage 348). The process ends atend point 350. -
FIG. 8 illustrates one implementation of the stages involved in accessing an external attacks service/directory to help determine security adjustments to make based on user presence or absence. In one form, the process ofFIG. 8 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 370 with accessing an external attacks service/directory (e.g. using a web service, etc.) to determine the most likely ports and/or services to be attacked on a computer (e.g. at a particular moment) (stage 372). When the user is absent from the computer, the ports and/or services that the external directory indicated were the highest targets are disabled (stage 374). When the user is present at the computer, the system re-enables the ports and/or services that were disabled, but optionally monitors their activity with heightened awareness of the security risk (stage 376). The process ends atend point 378. -
FIG. 9 illustrates one implementation of the stages involved in adjusting the operation of one or more applications based on the classification(s) of users present. In one form, the process ofFIG. 9 is at least partially implemented in the operating logic ofcomputing device 100. The procedure begins atstart point 390 with using one or more input devices (e.g. camera, sensor, keyboard, etc.) to determine that one or more users are present (stage 392). The system determines the classification(s)/demographic(s) associated with the one or more users present (e.g. adult, minor child, male, female, etc.) (stage 394). The operation of one or more applications is adjusted based on the classification(s)/demographic(s) of users present (stage 396). As a few non-limiting examples, the system can increase a logging operation and/or disable at least one feature of one or more applications if a minor child is present, etc. (stage 396). The process ends atend point 398. - Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. All equivalents, changes, and modifications that come within the spirit of the implementations as described herein and/or by the following claims are desired to be protected.
- For example, a person of ordinary skill in the computer software art will recognize that the client and/or server arrangements, user interface screen content, and/or data layouts as described in the examples discussed herein could be organized differently on one or more computers to include fewer or additional options or features than as portrayed in the examples.
Claims (20)
1. A method for enhancing security of a computer when a user is detected to be absent comprising the steps of:
detecting an absence of a user from a computer system; and
disabling at least one system port or service on the computer system that does not need to be enabled while the user is absent to increase a security state of the computer system.
2. The method of claim 1 , further comprising:
accessing an external attack service to retrieve a most likely list of one or more services to be attacked on the computer system.
3. The method of claim 2 , wherein the at least one system port or service disabled is at least in part based upon the list retrieved from the external attack service.
4. The method of claim 2 , wherein the external attack service is accessed using a web service.
5. The method of claim 2 , wherein the external attack service provides access to information about attacks that are most likely to happen at a current moment.
6. The method of claim 1 , wherein the at least one system port or service disabled is a file-sharing port.
7. The method of claim 1 , wherein the at least one system port or service disabled is a voice-over-IP port.
8. The method of claim 1 , wherein the absence of the user is detected from a period of inactivity on an input device.
9. The method of claim 1 , wherein the absence of the user is detected using a camera.
10. The method of claim 1 , wherein the absence of the user is detected using a sensor.
11. A computer-readable medium having computer-executable instructions for causing a computer to perform the steps recited in claim 1 .
12. A computer-readable medium having computer-executable instructions for causing a computer to perform steps comprising:
use at least one input device to detect whether one or more users are present;
access an attack directory to retrieve information that includes at least one most likely service to be attacked; and
use at least part of the information retrieved from the attack directory along with the detection of whether one or more users are present to make at least one adjustment to a system operation.
13. The computer-readable medium of claim 12 , further having computer-executable instructions for causing a computer to perform the step comprising:
detect that the user is absent.
14. The computer-readable medium of claim 13 , further having computer-executable instructions for causing a computer to perform steps comprising:
upon detecting that the user is absent, use at least part of the information retrieved from the attack service to determine a service to disable.
15. A method for adjusting the operation of a computer based on a classification of a user present comprising the steps of:
using at least one input device to detect that at least one user is present;
determining a classification associated with the at least one user present; and
adjusting an operation of at least one application based on the classification of the at least one user present.
16. The method of claim 15 , wherein the classification of the user is a minor child.
17. The method of claim 16 , wherein the operation includes increasing a logging action for the at least one application.
18. The method of claim 16 , wherein the operation includes disabling at least one feature in the at least one application.
19. The method of claim 15 , wherein the input device is a camera.
20. A computer-readable medium having computer-executable instructions for causing a computer to perform the steps recited in claim 15 .
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/472,575 US20070300312A1 (en) | 2006-06-22 | 2006-06-22 | User presence detection for altering operation of a computing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/472,575 US20070300312A1 (en) | 2006-06-22 | 2006-06-22 | User presence detection for altering operation of a computing system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070300312A1 true US20070300312A1 (en) | 2007-12-27 |
Family
ID=38874950
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/472,575 Abandoned US20070300312A1 (en) | 2006-06-22 | 2006-06-22 | User presence detection for altering operation of a computing system |
Country Status (1)
Country | Link |
---|---|
US (1) | US20070300312A1 (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090273679A1 (en) * | 2008-05-01 | 2009-11-05 | Apple Inc. | Apparatus and method for calibrating image capture devices |
US20090282147A1 (en) * | 2004-07-30 | 2009-11-12 | Morris Robert P | System And Method For Harmonizing Changes In User Activities, Device Capabilities And Presence Information |
US20100061659A1 (en) * | 2008-09-08 | 2010-03-11 | Apple Inc. | Method and apparatus for depth sensing keystoning |
US20100083188A1 (en) * | 2008-09-26 | 2010-04-01 | Apple Inc. | Computer user interface system and methods |
US20100251375A1 (en) * | 2009-03-24 | 2010-09-30 | G2, Inc. | Method and apparatus for minimizing network vulnerability |
US20110075055A1 (en) * | 2009-09-30 | 2011-03-31 | Apple Inc. | Display system having coherent and incoherent light sources |
US20110115964A1 (en) * | 2008-09-26 | 2011-05-19 | Apple Inc. | Dichroic aperture for electronic imaging device |
US20110115766A1 (en) * | 2009-11-16 | 2011-05-19 | Sharp Laboratories Of America,Inc. | Energy efficient display system |
US20110149094A1 (en) * | 2009-12-22 | 2011-06-23 | Apple Inc. | Image capture device having tilt and/or perspective correction |
US20130018819A1 (en) * | 2011-07-14 | 2013-01-17 | Networth Services, Inc. | Systems and methods for optimizing an investment portfolio |
US20130080789A1 (en) * | 2008-05-13 | 2013-03-28 | Veritrix, Inc. | Multi-Channel Multi-Factor Authentication |
US8497897B2 (en) | 2010-08-17 | 2013-07-30 | Apple Inc. | Image capture using luminance and chrominance sensors |
US8508671B2 (en) | 2008-09-08 | 2013-08-13 | Apple Inc. | Projection systems and methods |
US8538132B2 (en) | 2010-09-24 | 2013-09-17 | Apple Inc. | Component concentricity |
US8560661B2 (en) | 2010-12-30 | 2013-10-15 | Kaspersky Lab Zao | System and methods for launching antivirus application tasks during computer downtime |
US8610726B2 (en) | 2008-09-26 | 2013-12-17 | Apple Inc. | Computer systems and methods with projected display |
US8619128B2 (en) | 2009-09-30 | 2013-12-31 | Apple Inc. | Systems and methods for an imaging system using multiple image sensors |
US20140181889A1 (en) * | 2012-12-21 | 2014-06-26 | Websense, Inc. | Method and aparatus for presence based resource management |
US9356061B2 (en) | 2013-08-05 | 2016-05-31 | Apple Inc. | Image sensor with buried light shield and vertical gate |
US9552478B2 (en) | 2010-05-18 | 2017-01-24 | AO Kaspersky Lab | Team security for portable information devices |
US9582335B2 (en) | 2011-11-24 | 2017-02-28 | AO Kaspersky Lab | System and method for distributing processing of computer security tasks |
US10290281B2 (en) | 2009-09-07 | 2019-05-14 | Saturn Licensing Llc | Display device and control method |
Citations (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6002427A (en) * | 1997-09-15 | 1999-12-14 | Kipust; Alan J. | Security system with proximity sensing for an electronic device |
US6189105B1 (en) * | 1998-02-20 | 2001-02-13 | Lucent Technologies, Inc. | Proximity detection of valid computer user |
US6282673B1 (en) * | 1997-05-13 | 2001-08-28 | Micron Technology, Inc. | Method of recording information system events |
US6330676B1 (en) * | 1998-09-08 | 2001-12-11 | International Business Machines Corporation | Method and system for the automatic initiation of power application and start-up activities in a computer system |
US20020021307A1 (en) * | 2000-04-24 | 2002-02-21 | Steve Glenn | Method and apparatus for utilizing online presence information |
US6374145B1 (en) * | 1998-12-14 | 2002-04-16 | Mark Lignoul | Proximity sensor for screen saver and password delay |
US6530081B1 (en) * | 1999-11-30 | 2003-03-04 | International Business Machines Corporation | Methods, systems and computer program products for controlling applications/preferences of a pervasive computing device |
US20030084322A1 (en) * | 2001-10-31 | 2003-05-01 | Schertz Richard L. | System and method of an OS-integrated intrusion detection and anti-virus system |
US6560711B1 (en) * | 1999-05-24 | 2003-05-06 | Paul Given | Activity sensing interface between a computer and an input peripheral |
US20030110396A1 (en) * | 2001-05-03 | 2003-06-12 | Lewis Lundy M. | Method and apparatus for predicting and preventing attacks in communications networks |
US6654751B1 (en) * | 2001-10-18 | 2003-11-25 | Networks Associates Technology, Inc. | Method and apparatus for a virus information patrol |
US20050015615A1 (en) * | 2003-07-18 | 2005-01-20 | Sbc Knowledge Ventures, L.P. | System and method for detecting computer port inactivity |
US20050097595A1 (en) * | 2003-11-05 | 2005-05-05 | Matti Lipsanen | Method and system for controlling access to content |
US20050105698A1 (en) * | 2003-11-14 | 2005-05-19 | Lucent Technologies Inc. | Presence detection for IP telephony |
US20050183143A1 (en) * | 2004-02-13 | 2005-08-18 | Anderholm Eric J. | Methods and systems for monitoring user, application or device activity |
US20050182962A1 (en) * | 2004-02-17 | 2005-08-18 | Paul Given | Computer security peripheral |
US20050184853A1 (en) * | 2002-05-03 | 2005-08-25 | Payne Roger A. | Information security |
US20060005035A1 (en) * | 2004-06-22 | 2006-01-05 | Coughlin Michael E | Keystroke input device for use with an RFID tag and user verification system |
US20060023915A1 (en) * | 2004-06-09 | 2006-02-02 | Aalbu Lars E | System and method for presence detection |
US20060101400A1 (en) * | 2004-10-14 | 2006-05-11 | International Business Machines Corporation | Apparatus and methods for performing computer system maintenance and notification activities in an opportunistic manner |
US20070118897A1 (en) * | 2005-11-09 | 2007-05-24 | Munyon Paul J | System and method for inhibiting access to a computer |
US20070168863A1 (en) * | 2003-03-03 | 2007-07-19 | Aol Llc | Interacting avatars in an instant messaging communication session |
US20070294369A1 (en) * | 2003-06-09 | 2007-12-20 | Andrew Ginter | Event monitoring and management |
US7370362B2 (en) * | 2005-03-03 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for locating rogue access point switch ports in a wireless network |
US7401083B2 (en) * | 2005-05-23 | 2008-07-15 | Goldman Sachs & Co. | Methods and systems for managing user access to computer software application programs |
US7823199B1 (en) * | 2004-02-06 | 2010-10-26 | Extreme Networks | Method and system for detecting and preventing access intrusion in a network |
-
2006
- 2006-06-22 US US11/472,575 patent/US20070300312A1/en not_active Abandoned
Patent Citations (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6282673B1 (en) * | 1997-05-13 | 2001-08-28 | Micron Technology, Inc. | Method of recording information system events |
US6002427A (en) * | 1997-09-15 | 1999-12-14 | Kipust; Alan J. | Security system with proximity sensing for an electronic device |
US6189105B1 (en) * | 1998-02-20 | 2001-02-13 | Lucent Technologies, Inc. | Proximity detection of valid computer user |
US6330676B1 (en) * | 1998-09-08 | 2001-12-11 | International Business Machines Corporation | Method and system for the automatic initiation of power application and start-up activities in a computer system |
US20020095222A1 (en) * | 1998-12-14 | 2002-07-18 | Mark Lignoul | Proximity sensor for screen saver and password delay |
US6374145B1 (en) * | 1998-12-14 | 2002-04-16 | Mark Lignoul | Proximity sensor for screen saver and password delay |
US6560711B1 (en) * | 1999-05-24 | 2003-05-06 | Paul Given | Activity sensing interface between a computer and an input peripheral |
US6530081B1 (en) * | 1999-11-30 | 2003-03-04 | International Business Machines Corporation | Methods, systems and computer program products for controlling applications/preferences of a pervasive computing device |
US20020021307A1 (en) * | 2000-04-24 | 2002-02-21 | Steve Glenn | Method and apparatus for utilizing online presence information |
US20030110396A1 (en) * | 2001-05-03 | 2003-06-12 | Lewis Lundy M. | Method and apparatus for predicting and preventing attacks in communications networks |
US6654751B1 (en) * | 2001-10-18 | 2003-11-25 | Networks Associates Technology, Inc. | Method and apparatus for a virus information patrol |
US20030084322A1 (en) * | 2001-10-31 | 2003-05-01 | Schertz Richard L. | System and method of an OS-integrated intrusion detection and anti-virus system |
US20050184853A1 (en) * | 2002-05-03 | 2005-08-25 | Payne Roger A. | Information security |
US20070168863A1 (en) * | 2003-03-03 | 2007-07-19 | Aol Llc | Interacting avatars in an instant messaging communication session |
US20070294369A1 (en) * | 2003-06-09 | 2007-12-20 | Andrew Ginter | Event monitoring and management |
US20050015615A1 (en) * | 2003-07-18 | 2005-01-20 | Sbc Knowledge Ventures, L.P. | System and method for detecting computer port inactivity |
US20050097595A1 (en) * | 2003-11-05 | 2005-05-05 | Matti Lipsanen | Method and system for controlling access to content |
US20050105698A1 (en) * | 2003-11-14 | 2005-05-19 | Lucent Technologies Inc. | Presence detection for IP telephony |
US7823199B1 (en) * | 2004-02-06 | 2010-10-26 | Extreme Networks | Method and system for detecting and preventing access intrusion in a network |
US20050183143A1 (en) * | 2004-02-13 | 2005-08-18 | Anderholm Eric J. | Methods and systems for monitoring user, application or device activity |
US20050182962A1 (en) * | 2004-02-17 | 2005-08-18 | Paul Given | Computer security peripheral |
US20060023915A1 (en) * | 2004-06-09 | 2006-02-02 | Aalbu Lars E | System and method for presence detection |
US20060005035A1 (en) * | 2004-06-22 | 2006-01-05 | Coughlin Michael E | Keystroke input device for use with an RFID tag and user verification system |
US20060101400A1 (en) * | 2004-10-14 | 2006-05-11 | International Business Machines Corporation | Apparatus and methods for performing computer system maintenance and notification activities in an opportunistic manner |
US7370362B2 (en) * | 2005-03-03 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for locating rogue access point switch ports in a wireless network |
US7401083B2 (en) * | 2005-05-23 | 2008-07-15 | Goldman Sachs & Co. | Methods and systems for managing user access to computer software application programs |
US20070118897A1 (en) * | 2005-11-09 | 2007-05-24 | Munyon Paul J | System and method for inhibiting access to a computer |
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090282147A1 (en) * | 2004-07-30 | 2009-11-12 | Morris Robert P | System And Method For Harmonizing Changes In User Activities, Device Capabilities And Presence Information |
US20090273679A1 (en) * | 2008-05-01 | 2009-11-05 | Apple Inc. | Apparatus and method for calibrating image capture devices |
US8405727B2 (en) | 2008-05-01 | 2013-03-26 | Apple Inc. | Apparatus and method for calibrating image capture devices |
US9338006B2 (en) * | 2008-05-13 | 2016-05-10 | K.Y. Trix Ltd. | Multi-channel multi-factor authentication |
US20130080789A1 (en) * | 2008-05-13 | 2013-03-28 | Veritrix, Inc. | Multi-Channel Multi-Factor Authentication |
US20100061659A1 (en) * | 2008-09-08 | 2010-03-11 | Apple Inc. | Method and apparatus for depth sensing keystoning |
US8508671B2 (en) | 2008-09-08 | 2013-08-13 | Apple Inc. | Projection systems and methods |
US8538084B2 (en) | 2008-09-08 | 2013-09-17 | Apple Inc. | Method and apparatus for depth sensing keystoning |
US20100083188A1 (en) * | 2008-09-26 | 2010-04-01 | Apple Inc. | Computer user interface system and methods |
US8527908B2 (en) * | 2008-09-26 | 2013-09-03 | Apple Inc. | Computer user interface system and methods |
US8761596B2 (en) | 2008-09-26 | 2014-06-24 | Apple Inc. | Dichroic aperture for electronic imaging device |
US20110115964A1 (en) * | 2008-09-26 | 2011-05-19 | Apple Inc. | Dichroic aperture for electronic imaging device |
US8610726B2 (en) | 2008-09-26 | 2013-12-17 | Apple Inc. | Computer systems and methods with projected display |
US20100251375A1 (en) * | 2009-03-24 | 2010-09-30 | G2, Inc. | Method and apparatus for minimizing network vulnerability |
US10290281B2 (en) | 2009-09-07 | 2019-05-14 | Saturn Licensing Llc | Display device and control method |
US8502926B2 (en) | 2009-09-30 | 2013-08-06 | Apple Inc. | Display system having coherent and incoherent light sources |
US20110075055A1 (en) * | 2009-09-30 | 2011-03-31 | Apple Inc. | Display system having coherent and incoherent light sources |
US8619128B2 (en) | 2009-09-30 | 2013-12-31 | Apple Inc. | Systems and methods for an imaging system using multiple image sensors |
US20110115766A1 (en) * | 2009-11-16 | 2011-05-19 | Sharp Laboratories Of America,Inc. | Energy efficient display system |
US9113078B2 (en) | 2009-12-22 | 2015-08-18 | Apple Inc. | Image capture device having tilt and/or perspective correction |
US8687070B2 (en) | 2009-12-22 | 2014-04-01 | Apple Inc. | Image capture device having tilt and/or perspective correction |
US20110149094A1 (en) * | 2009-12-22 | 2011-06-23 | Apple Inc. | Image capture device having tilt and/or perspective correction |
US9565364B2 (en) | 2009-12-22 | 2017-02-07 | Apple Inc. | Image capture device having tilt and/or perspective correction |
US9552478B2 (en) | 2010-05-18 | 2017-01-24 | AO Kaspersky Lab | Team security for portable information devices |
US8497897B2 (en) | 2010-08-17 | 2013-07-30 | Apple Inc. | Image capture using luminance and chrominance sensors |
US8538132B2 (en) | 2010-09-24 | 2013-09-17 | Apple Inc. | Component concentricity |
US8560661B2 (en) | 2010-12-30 | 2013-10-15 | Kaspersky Lab Zao | System and methods for launching antivirus application tasks during computer downtime |
US20130018819A1 (en) * | 2011-07-14 | 2013-01-17 | Networth Services, Inc. | Systems and methods for optimizing an investment portfolio |
US9582335B2 (en) | 2011-11-24 | 2017-02-28 | AO Kaspersky Lab | System and method for distributing processing of computer security tasks |
US9117054B2 (en) * | 2012-12-21 | 2015-08-25 | Websense, Inc. | Method and aparatus for presence based resource management |
US10044715B2 (en) | 2012-12-21 | 2018-08-07 | Forcepoint Llc | Method and apparatus for presence based resource management |
US20140181889A1 (en) * | 2012-12-21 | 2014-06-26 | Websense, Inc. | Method and aparatus for presence based resource management |
US9356061B2 (en) | 2013-08-05 | 2016-05-31 | Apple Inc. | Image sensor with buried light shield and vertical gate |
US9842875B2 (en) | 2013-08-05 | 2017-12-12 | Apple Inc. | Image sensor with buried light shield and vertical gate |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070300312A1 (en) | User presence detection for altering operation of a computing system | |
US11775644B2 (en) | Systems and methods for providing security services during power management mode | |
US11281485B2 (en) | Extended context delivery for context-based authorization | |
US11025665B2 (en) | Detection and identification of targeted attacks on a computing system | |
US11228593B2 (en) | Session security splitting and application profiler | |
US9860271B2 (en) | Health monitor based distributed denial of service attack mitigation | |
US20200028853A1 (en) | System and Method Providing Security Friction for Atypical Resource Access Requests | |
US8863008B2 (en) | Automatic removal of sensitive information from a computer screen | |
US11630887B2 (en) | Using an NP-complete problem to deter malicious clients | |
GB2461870A (en) | Database of expected application behaviours distributed to mobile devices and used for malware detection | |
US20190246278A1 (en) | Virtual private network based parental control service with motion-based restricted mode | |
US20080005316A1 (en) | Method and apparatus for detecting zombie-generated spam | |
Ning et al. | Correlating alerts using prerequisites of intrusions | |
US8510841B2 (en) | Detecting malware using patterns | |
WO2008106258A1 (en) | Centralized service for awakening a computing device | |
US20210141934A1 (en) | Securing digital content using separately authenticated hidden folders | |
AU2017265064B2 (en) | Access to data on a remote device | |
US20130117768A1 (en) | Web service api for unified contact store | |
US9338112B2 (en) | Safety protocols for messaging service-enabled cloud services | |
US20150372953A1 (en) | Stateful notification | |
KR20230053663A (en) | System and method for preventing counterfeiting of digital content | |
WO2020019513A1 (en) | Port vulnerability detection method, terminal, and computer-readable storage medium | |
CN110266710B (en) | Cluster safety protection method and device, server and storage medium | |
US11540134B1 (en) | Systems and methods for proactive call spam/scam protection using network extensions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHITSAZ, BEHROOZ;KIROVSKI, DARKO;REEL/FRAME:018072/0857 Effective date: 20060621 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0509 Effective date: 20141014 |