Publications
    - Reset

Defensive Publications are a method for the open source community to prevent the issuance of low quality software patents. These publications serve as evidence to disclose to the examiner what is new and innovative within the technology. Through Linux Defenders, developers collaborate with our team to ensure that these publications are effective in protecting the freedom to create, invent and operate.

Publication Date Title Tags
July 28, 2009 USB Two Factor Authentication- A Novel Methodology for Physically Authenticating a New Hardware Device
New hardware devices added to secure networks require authentication to verify that the devices belong on the secure network.
hardware authentication
July 28, 2009 Two Factor Authenication Mechanism
The Assisted Two Factor Authentication Mechanism via a Trusted External Source is a new secure method for adding hardware to a secure network.
hardware authentication peer information
March 11, 2009 Method and System for Automatically Finding and Updating Hardware Components
Although current operating systems have automated driver search systems in place, they are often ineffective due to the fact that drivers are not located centrally on a single server, but rather can be anywhere on the internet.
hardware automatic installation