USRE42382E1 - Volume mount authentication - Google Patents
Volume mount authentication Download PDFInfo
- Publication number
- USRE42382E1 USRE42382E1 US12/860,612 US86061210A USRE42382E US RE42382 E1 USRE42382 E1 US RE42382E1 US 86061210 A US86061210 A US 86061210A US RE42382 E USRE42382 E US RE42382E
- Authority
- US
- United States
- Prior art keywords
- zone
- computing device
- action handler
- media
- execution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 230000009471 action Effects 0.000 claims abstract description 100
- 238000000034 method Methods 0.000 claims abstract description 96
- 239000011159 matrix material Substances 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 16
- 238000004364 calculation method Methods 0.000 claims description 25
- 230000004044 response Effects 0.000 claims description 25
- 238000003860 storage Methods 0.000 claims description 22
- 238000005192 partition Methods 0.000 claims description 15
- 238000005303 weighing Methods 0.000 claims description 12
- 238000012360 testing method Methods 0.000 claims description 5
- 238000009825 accumulation Methods 0.000 claims 2
- 230000008569 process Effects 0.000 abstract description 13
- 238000003780 insertion Methods 0.000 abstract description 4
- 230000037431 insertion Effects 0.000 abstract description 4
- 230000004048 modification Effects 0.000 description 6
- 238000012986 modification Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 241000700605 Viruses Species 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000032683 aging Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- ZXQYGBMAQZUVMI-GCMPRSNUSA-N gamma-cyhalothrin Chemical compound CC1(C)[C@@H](\C=C(/Cl)C(F)(F)F)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 ZXQYGBMAQZUVMI-GCMPRSNUSA-N 0.000 description 1
- 230000008595 infiltration Effects 0.000 description 1
- 238000001764 infiltration Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003211 malignant effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
Description
- 1 Media
- 2 Media device
- 3 Computing device
- 4 Computer
- 5 Volume mount point
- 6 Metadata
- 7 Metadata object
- 8 Metadata element
- 9 Trustworthy factor calculator
- 10 Raw score
- 11 Scoring matrix
- 12 Level of trust zone
- 13 Action handler
- 14 Zone action handler
- 15 Progress bar
- 16 Volume mount notification
- 17 Logical disk information
- 18 Physical disk partition address
- 19 Physical storage device address
- 20 Data communication channels
- 21 Media computing devices
- 22 Calculation steps
- 23 Weighing factors
- 24 Score value
- 25 Maximum possible score value
- 26 Overall maximum score
- 27 Trustworthy factor score
- 28 Ultimate signal
- 29 Thread
- 30 Alternate calculation steps
- 31 Alternate scoring matrix
- 32 Remote location
- 33 Remember Media action handler
- 34 Media Previously Trusted action handler
- 35 External security level
- 36 Data structures
- 37 Matrix of numerical scores
- 38 Matrix of weighing factors
- 39 Zone action handler response
- 40 volume mount point icon
- 50 Volume Trust (application)
- S100 Detect Insertion of Media
- S110 User Logs onto Computer
- S120 Automatically Start Application
- S130 Identify Existing Mount Points
- S140 Wait for Media Notification
- S150 User Inserts External Storage Device with Media
- S160 Spawn a Thread
- S170 Display Progress Bar
- S200 Extract Media Metadata
- S210 Convert Logical Disk to Partition
- S220 Convert Partition to Physical Drive
- S230 Fetch Storage Device Data
- S240 Fetch Logical Disk Data
- S250 Fetch Disk Partition Data
- S260 Fetch Physical Media Data
- S270 Fetch Data Channel Data
- S280 Fetch Media Device Data
- S300 Load Trustworthy Factor Calculator
- S310 Identify Location
- S320 Lookup Trustworthy Factor for Identified Location
- S330 Load Trustworthy Factor Calculator from Local Computer
- S340 Download Trustworthy Factor Calculator from Remote Location
- S350 Initialize Calculator and Load Weight Factors
- S400 Calculate Trustworthy Factor
- S410 Compute Actual and Maximum Possible Score
- S420 Calculate Normalized Trustworthy Factor
- S500 Load Scoring Matrix
- S510 Identify Location
- S520 Lookup Scoring Matrix for Identified Location
- S600 Determine Level of Trust Zone
- S700 Execute Appropriate Zone Action Handlers
- S705 Check if Media Previously Trusted
- S710 Prompt for Password
- S720 Prompt for Biometric
- S730 Prompt for Security Token Card
- S740 Determine if User Belongs to the Administrator Security Group
- S750 Remember Media Decision
- S760 Always Associate Media with Mount or Dismount Conclusion
- S770 Determine and Track Association with an Expiration Date
- S800 Allow—Disallow Mount
- S810 Show Level of Trust Zone
Claims (74)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/860,612 USRE42382E1 (en) | 2004-07-24 | 2010-08-20 | Volume mount authentication |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/898,048 US7480931B2 (en) | 2004-07-24 | 2004-07-24 | Volume mount authentication |
US12/860,612 USRE42382E1 (en) | 2004-07-24 | 2010-08-20 | Volume mount authentication |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/898,048 Reissue US7480931B2 (en) | 2004-07-24 | 2004-07-24 | Volume mount authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE42382E1 true USRE42382E1 (en) | 2011-05-17 |
Family
ID=35658624
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/898,048 Ceased US7480931B2 (en) | 2004-07-24 | 2004-07-24 | Volume mount authentication |
US12/860,612 Active 2026-10-13 USRE42382E1 (en) | 2004-07-24 | 2010-08-20 | Volume mount authentication |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/898,048 Ceased US7480931B2 (en) | 2004-07-24 | 2004-07-24 | Volume mount authentication |
Country Status (1)
Country | Link |
---|---|
US (2) | US7480931B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140173686A1 (en) * | 2012-12-19 | 2014-06-19 | Taeho Kgil | Device Communication Based On Device Trustworthiness |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100337502C (en) * | 2004-07-28 | 2007-09-12 | 华为技术有限公司 | Method for logic binding and verifying parts in device |
US20060294380A1 (en) * | 2005-06-28 | 2006-12-28 | Selim Aissi | Mechanism to evaluate a token enabled computer system |
JP4929803B2 (en) * | 2006-04-10 | 2012-05-09 | 富士通株式会社 | Authentication method, authentication apparatus, and authentication program |
US20080083037A1 (en) * | 2006-10-03 | 2008-04-03 | Rmcl, Inc. | Data loss and theft protection method |
US7886334B1 (en) * | 2006-12-11 | 2011-02-08 | Qurio Holdings, Inc. | System and method for social network trust assessment |
US8250639B2 (en) * | 2007-11-20 | 2012-08-21 | Intel Corporation | Micro and macro trust in a decentralized environment |
US8290960B2 (en) * | 2008-10-24 | 2012-10-16 | International Business Machines Corporation | Configurable trust context assignable to facts and associated trust metadata |
US20100106558A1 (en) * | 2008-10-24 | 2010-04-29 | International Business Machines Corporation | Trust Index Framework for Providing Data and Associated Trust Metadata |
US8443189B2 (en) * | 2008-10-24 | 2013-05-14 | International Business Machines Corporation | Trust event notification and actions based on thresholds and associated trust metadata scores |
US8276157B2 (en) | 2009-10-23 | 2012-09-25 | International Business Machines Corporation | Monitoring information assets and information asset topologies |
US8209316B2 (en) * | 2010-01-05 | 2012-06-26 | Microsoft Corporation | Providing suggestions of related videos |
US8566934B2 (en) | 2011-01-21 | 2013-10-22 | Gigavation, Inc. | Apparatus and method for enhancing security of data on a host computing device and a peripheral device |
GB2506803B (en) | 2011-08-10 | 2020-07-01 | Srivastava Gita | Apparatus and method for enhancing security of data on a host computing device and a peripheral device |
US20130173653A1 (en) * | 2011-12-30 | 2013-07-04 | Microsoft Corporation | Path composition for planning |
US9706410B2 (en) * | 2012-03-07 | 2017-07-11 | Rapid 7, Inc. | Controlling enterprise access by mobile devices |
US20170326479A1 (en) * | 2016-05-10 | 2017-11-16 | Glacier Fresh | Water filter |
GB2545534B (en) | 2016-08-03 | 2019-11-06 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
GB2552721A (en) | 2016-08-03 | 2018-02-07 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
US11301550B2 (en) * | 2016-09-07 | 2022-04-12 | Cylance Inc. | Computer user authentication using machine learning |
GB2555660B (en) * | 2016-11-07 | 2019-12-04 | Cirrus Logic Int Semiconductor Ltd | Methods and apparatus for authentication in an electronic device |
CN109189734A (en) * | 2018-09-30 | 2019-01-11 | 维沃移动通信有限公司 | A kind of file open method and mobile terminal |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5832213A (en) * | 1996-07-03 | 1998-11-03 | Sun Microsystems, Inc. | Flexible mounting and unmounting of user removable media |
US6012145A (en) * | 1993-11-13 | 2000-01-04 | Calluna Technology Limited | Security system for hard disk drive |
US6014746A (en) * | 1997-02-21 | 2000-01-11 | Lockheed Martin Energy Research Corporation | Workstation lock and alarm system |
US6301665B1 (en) * | 1998-04-30 | 2001-10-09 | Compaq Computer Corporation | Security methodology for devices having plug and play capabilities |
US20020083339A1 (en) * | 2000-12-22 | 2002-06-27 | Blumenau Steven M. | Method and apparatus for preventing unauthorized access by a network device |
US20030163719A1 (en) * | 2002-02-26 | 2003-08-28 | Fujitsu Limited | Removable disk device with identification information |
US6665714B1 (en) * | 1999-06-30 | 2003-12-16 | Emc Corporation | Method and apparatus for determining an identity of a network device |
WO2003107589A1 (en) | 2002-06-17 | 2003-12-24 | Koninklijke Philips Electronics N.V. | Method for authentication between devices |
US6711685B1 (en) * | 1998-07-17 | 2004-03-23 | International Business Machines Corporation | System and procedure for protection against the analytical espionage of secret information |
US20040117318A1 (en) * | 2002-12-16 | 2004-06-17 | Grawrock David W. | Portable token controlling trusted environment launch |
US20050015611A1 (en) * | 2003-06-30 | 2005-01-20 | Poisner David I. | Trusted peripheral mechanism |
US6904493B2 (en) * | 2002-07-11 | 2005-06-07 | Animeta Systems, Inc. | Secure flash memory device and method of operation |
US7107610B2 (en) * | 2001-05-11 | 2006-09-12 | Intel Corporation | Resource authorization |
US7191467B1 (en) * | 2002-03-15 | 2007-03-13 | Microsoft Corporation | Method and system of integrating third party authentication into internet browser code |
US7318150B2 (en) * | 2004-02-25 | 2008-01-08 | Intel Corporation | System and method to support platform firmware as a trusted process |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6819486B2 (en) * | 2001-01-17 | 2004-11-16 | 3M Innovative Properties Company | Projection screen having elongated structures |
-
2004
- 2004-07-24 US US10/898,048 patent/US7480931B2/en not_active Ceased
-
2010
- 2010-08-20 US US12/860,612 patent/USRE42382E1/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6012145A (en) * | 1993-11-13 | 2000-01-04 | Calluna Technology Limited | Security system for hard disk drive |
US6119232A (en) * | 1996-07-03 | 2000-09-12 | Sun Microsystems, Inc. | Flexible mounting and unmounting of user removable media |
US5832213A (en) * | 1996-07-03 | 1998-11-03 | Sun Microsystems, Inc. | Flexible mounting and unmounting of user removable media |
US6014746A (en) * | 1997-02-21 | 2000-01-11 | Lockheed Martin Energy Research Corporation | Workstation lock and alarm system |
US6301665B1 (en) * | 1998-04-30 | 2001-10-09 | Compaq Computer Corporation | Security methodology for devices having plug and play capabilities |
US6711685B1 (en) * | 1998-07-17 | 2004-03-23 | International Business Machines Corporation | System and procedure for protection against the analytical espionage of secret information |
US6665714B1 (en) * | 1999-06-30 | 2003-12-16 | Emc Corporation | Method and apparatus for determining an identity of a network device |
US20020083339A1 (en) * | 2000-12-22 | 2002-06-27 | Blumenau Steven M. | Method and apparatus for preventing unauthorized access by a network device |
US7107610B2 (en) * | 2001-05-11 | 2006-09-12 | Intel Corporation | Resource authorization |
US20030163719A1 (en) * | 2002-02-26 | 2003-08-28 | Fujitsu Limited | Removable disk device with identification information |
US7191467B1 (en) * | 2002-03-15 | 2007-03-13 | Microsoft Corporation | Method and system of integrating third party authentication into internet browser code |
WO2003107589A1 (en) | 2002-06-17 | 2003-12-24 | Koninklijke Philips Electronics N.V. | Method for authentication between devices |
US6904493B2 (en) * | 2002-07-11 | 2005-06-07 | Animeta Systems, Inc. | Secure flash memory device and method of operation |
US20040117318A1 (en) * | 2002-12-16 | 2004-06-17 | Grawrock David W. | Portable token controlling trusted environment launch |
US20050015611A1 (en) * | 2003-06-30 | 2005-01-20 | Poisner David I. | Trusted peripheral mechanism |
US7318150B2 (en) * | 2004-02-25 | 2008-01-08 | Intel Corporation | System and method to support platform firmware as a trusted process |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
US9122633B2 (en) | 2012-09-20 | 2015-09-01 | Paul Case, SR. | Case secure computer architecture |
US20140173686A1 (en) * | 2012-12-19 | 2014-06-19 | Taeho Kgil | Device Communication Based On Device Trustworthiness |
US9386045B2 (en) * | 2012-12-19 | 2016-07-05 | Visa International Service Association | Device communication based on device trustworthiness |
Also Published As
Publication number | Publication date |
---|---|
US7480931B2 (en) | 2009-01-20 |
US20060020792A1 (en) | 2006-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE42382E1 (en) | Volume mount authentication | |
US10554659B2 (en) | Anonymizing biometric data for use in a security system | |
US10902149B2 (en) | Remote testing analysis for software optimization based on client-side local differential privacy-based data | |
US20200380160A1 (en) | Data security classification sampling and labeling | |
CN107122669B (en) | Method and device for evaluating data leakage risk | |
US7552480B1 (en) | Method and system of assessing risk using a one-dimensional risk assessment model | |
US8332917B2 (en) | Providing secure dynamic role selection and managing privileged user access from a client device | |
US7647622B1 (en) | Dynamic security policy through use of empirical security events | |
US8606659B2 (en) | Identification of discrepancies in actual and expected inventories in computing environment having multiple provisioning orchestration server pool boundaries | |
US7730219B2 (en) | System and method for detecting free and open wireless networks | |
US20060021003A1 (en) | Biometric authentication system | |
US20080022367A1 (en) | Multi-User BIOS Authentication | |
RU2638775C2 (en) | System of access control and management based on biometric technologies for authenticating person by voice and by face | |
US20070168574A1 (en) | System and method for securing access to general purpose input/output ports in a computer system | |
CN103201747A (en) | A method for attesting a plurality of data processing systems | |
US20080052526A1 (en) | System and Method for Enrolling Users in a Pre-Boot Authentication Feature | |
US20130097694A1 (en) | Protecting an electronic device against unathorized hardware use | |
US20220109677A1 (en) | Methods and systems for detecting inadvertent unauthorized account access | |
US11019494B2 (en) | System and method for determining dangerousness of devices for a banking service | |
CN113498592B (en) | Method and system for digital property authentication and management | |
EP3543882B1 (en) | Method and system for identifying original data by using data order | |
Kimm et al. | Multilevel Security Embedded Information Retrieval and Tracking on Cloud Environments | |
CN104134025A (en) | Mobile terminal locking method and device based on SIM cards and mobile terminal | |
JP7261136B2 (en) | LEAST PRIVILEGE IDENTIFICATION DEVICE AND LEAST PRIVILEGE IDENTIFICATION METHOD | |
US20230342661A1 (en) | Machine learning based monitoring focus engine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
REMI | Maintenance fee reminder mailed | ||
AS | Assignment |
Owner name: IDERA, INC., TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:BBS TECHNOLOGIES, INC.;REEL/FRAME:029429/0262 Effective date: 20120127 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
SULP | Surcharge for late payment | ||
AS | Assignment |
Owner name: SQUARE 1 BANK, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNOR:IDERA, INC.;REEL/FRAME:030574/0185 Effective date: 20121120 |
|
AS | Assignment |
Owner name: IDERA, INC. F/K/A BBS TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:SQUARE 1 BANK;REEL/FRAME:030781/0275 Effective date: 20130709 |
|
AS | Assignment |
Owner name: COMERICA BANK, AS AGENT, MICHIGAN Free format text: SECURITY INTEREST;ASSIGNORS:IDERA, INC.;PRECISE SOFTWARE SOLUTIONS, INC.;COPPEREGG CORPORATION;REEL/FRAME:033696/0004 Effective date: 20140905 |
|
AS | Assignment |
Owner name: FIFTH STREET MANAGEMENT LLC, AS AGENT, CONNECTICUT Free format text: SECURITY INTEREST;ASSIGNORS:IDERA, INC.;PRECISE SOFTWARE SOLUTIONS, INC.;COPPEREGG CORPORATION;REEL/FRAME:034260/0360 Effective date: 20141105 |
|
AS | Assignment |
Owner name: IDERA, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 Owner name: PRECISE SOFTWARE SOLUTIONS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:COMERICA BANK;REEL/FRAME:036747/0982 Effective date: 20141105 |
|
AS | Assignment |
Owner name: IDERA, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 Owner name: COPPEREGG CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 Owner name: PRECISE SOFTWARE SOLUTIONS, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:FIFTH STREET MANAGEMENT LLC;REEL/FRAME:036771/0552 Effective date: 20151009 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: FIRST LIEN SECURITY AGREEMENT;ASSIGNORS:IDERA, INC.;CODEGEAR LLC;EMBARCADERO TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:036842/0410 Effective date: 20151009 |
|
AS | Assignment |
Owner name: JEFFERIES FINANCE LLC, AS COLLATERAL AGENT, NEW YO Free format text: SECOND LIEN SECURITY AGREEMENT;ASSIGNORS:IDERA, INC.;CODEGEAR LLC;EMBARCADERO TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:036863/0137 Effective date: 20151009 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2553); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: IDERA, INC., TEXAS Free format text: CHANGE OF NAME;ASSIGNOR:CORECO IDERA OPS, INC.;REEL/FRAME:066626/0867 Effective date: 20240101 Owner name: CORECO IDERA OPS, INC., TEXAS Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:IDERA, INC.;REEL/FRAME:066496/0733 Effective date: 20240219 |