Patent application number | Description | Published |
20090089887 | Theft-deterrence method and apparatus for processor based devices - A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment. | 04-02-2009 |
20090248827 | METHOD AND APPARATUS FOR CONNECTION - AND NETWORK - NETWORK-INDEPENDENT ON-LINE AND OFF-LINE THEFT-MANAGEMENT PROTOCOL AND SERVICE FOR PROCESSOR BASED DEVICES - A theft-deterrence process enabling a theft-deterrence server, remotely disposed from the processor based device, to deter or thwart theft of the processor based device, is disclosed herein. In various embodiments, the theft-deterrence process employs connection and network independent communication for at least one direction between the theft deterrence server and the processor based device. | 10-01-2009 |
20090282265 | METHOD AND APPARATUS FOR PREVENTING ACCESS TO ENCRYPTED DATA IN A NODE - A method of preventing access of data in a node quickly and securely when the node is lost or stolen. The data is first encrypted using an encryption algorithm with a cryptographic key-material. Heuristic methods of detecting un-authorized access to the node are implemented to generate a theft-trigger. The theft-trigger is received and sent to a central authority. The validity of the trigger is verified and the central authority sends an acknowledgement of the trigger. When approval is given from the central authority, access to the data is prevented by deleting or concealing some cryptographic key-material. | 11-12-2009 |
20090287938 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-19-2009 |
20100023782 | CRYPTOGRAPHIC KEY-TO-POLICY ASSOCIATION AND ENFORCEMENT FOR SECURE KEY-MANAGEMENT AND POLICY EXECUTION - Key-to-policy association and hardware-based policy enforcement for file/folder encryption (FFE) and/or full-disk encryption (FDE) are provided. A CPU independent microprocessor (CIM) is coupled to a platform and provides a secure storage service, secure non-volatile storage, secure policy enforcement engine, and system interface for communication with platform components independent of the CPU. The CIM stores a key and its associated policies by generating a hardware-derived key to wrap the key prior to securely storing it in non-volatile storage on the CIM. Upon receiving a request for key-access by an application, policy status and credentials are verified before the key is returned. | 01-28-2010 |
20100162368 | Method, apparatus and system for remote management of mobile devices - An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible. | 06-24-2010 |
20100169630 | Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed. | 07-01-2010 |
20100169965 | Enabling a service to return lost laptops - A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed. | 07-01-2010 |
20100332744 | DATA RECOVERY AND OVERWRITE INDEPENDENT OF OPERATING SYSTEM - Methods and systems to access data in a computer system independent of an operating environment of the computer system, including to recover data to a remote system, to overwrite data, and to copy data to a hidden partition. A management system may directly access a storage device of the computer system and communicate with the remote system over a data channel that is secure from an operating environment of the computer system. The management system may access the storage device on a block basis, using a device driver associated with a storage device controller, and may include a virtualization engine to access the storage device. The remote system may include logic to request meta-data, to identify disk blocks corresponding to files of interest from the meta-data, and to construct the files of interest from the disk blocks. | 12-30-2010 |
20110076986 | THEFT DETERRENT TECHNIQUES AND SECURE MOBILE PLATFORM SUBSCRITION FOR WIRELESSLY ENABLED MOBILE DEVICES - Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed. | 03-31-2011 |
20110078791 | Using chipset-based protected firmware for host software tamper detection and protection - A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system. | 03-31-2011 |
20110125485 | METHODS AND SYSTEMS FOR REAL TIME LANGUAGE TRANSLATION USING SOCIAL NETWORKING - Methods and systems with which a language translation may be obtained. An originator may request a translation by sending the passage to be translated to a server. The server may then broadcast the passage to prospective translators. In an embodiment, the translators may be connected to the originator and/or each other through a social network. Some or all of the prospective translators then return translations of the passage to the originator, via the server. The originator may then select the most desirable translation and inform the server. In an embodiment, the provision of the translation service may be part of an exchange or barter transaction. The server may apply a credit to the translator of the chosen translation. The translator may then use the credit in a subsequent trade or other transaction. | 05-26-2011 |
20110129077 | METHODS AND SYSTEMS FOR REAL TIME DISPLAY OF CALLER LOCATION, PROFILE, AND TRUST RELATIONSHIP - Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party. | 06-02-2011 |
20110131447 | Automated modular and secure boot firmware update - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 06-02-2011 |
20110151836 | Secure subscriber identity module service - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 06-23-2011 |
20110151854 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message. | 06-23-2011 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 06-23-2011 |
20110154502 | Data Protection - A method to manage data access in an electronic device comprising a housing having a lid comprises receiving, from a remote server, a data protection policy, storing the data protection policy in a memory location on the electronic device, detecting a transition from a lid open status to a lid closed status, and in response to the transition, implementing the data protection policy on the electronic device. Other embodiments may be described. | 06-23-2011 |
20110161145 | METHOD AND DEVICE FOR SECURELY DISPLAYING DIGITAL CONTENT ON A COMPUTING DEVICE - A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device. | 06-30-2011 |
20110237221 | METHOD AND APPARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY THE SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed. | 09-29-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20110246373 | PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed. | 10-06-2011 |
20110246757 | UNATTENDED SECURE REMOTE PC CLIENT WAKE, BOOT AND REMOTE LOGIN USING SMART PHONE - Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate. | 10-06-2011 |
20110289004 | METHOD AND DEVICE FOR CONDUCTING TRUSTED REMOTE PAYMENT TRANSACTIONS - A method, device, and system for conducting trusted payment transactions including establishing a trust relationship between a first mobile computing device and a second mobile computing device. The first mobile computing device may initiate a payment transaction with a point-of-sale device, communicate with the second mobile communication device to retrieve payment information from the second mobile communication device, and complete the payment transaction with the point-of-sale device using the payment information. The second mobile computing device is configured to verify the user and identity of the first mobile computing device prior to providing the payment information. Communications between the mobile computing devices may be encrypted using pre-determined encryption techniques. | 11-24-2011 |
20120030110 | DEVICE, SYSTEM, AND METHOD FOR LOCATION-BASED PAYMENT AUTHORIZATION - A device, system, and method for location-based payment authorization includes receiving a payment request for an order submitted from a mobile computing device via an e-commerce vendor website. A location of the mobile computing device is determined based on location data. In one embodiment, the payment request is authorized or denied based on whether the e-commerce vendor website has been authorized for the determined location of the mobile computing device. | 02-02-2012 |
20120115442 | SECURE SUBSCRIBER IDENTITY MODULE SERVICE - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 05-10-2012 |
20120131345 | SECURE SOFTWARE LICENSING AND PROVISIONING USING HARDWARE BASED SECURITY ENGINE - Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key. | 05-24-2012 |
20120166304 | REAL-TIME MOBILE PAYMENT PROCESSING SYSTEM - A method, system, and device are disclosed. In one embodiment the method includes receiving a recipient phone number into an electronic gift phone module (EGPM). The EGPM also receives a set of gift data that includes a gift identification. The EGPM sends the recipient phone number and at least some gift data to an electronic gift processing server module (EGPSM). The EGPSM purchases a recipient gift by utilizing the gift identification. The EGPSM also sends notification of the recipient gift purchase to the recipient phone number. | 06-28-2012 |
20120178481 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device. | 07-12-2012 |
20120270505 | HEADLESS EXTERNAL SENSOR DISCOVERY AND DATA ACCESS USING MOBILE DEVICE - A device, system, and machine readable medium for headless sensor measurements are disclosed. In one embodiment, the device is exclusive of a display. The device includes a sensor head to retrieve an amount of measurement data from an environment. The device also includes an I/O interface, a memory, a non-volatile storage, processing logic, and sensor data access protocol (SDAP) manageability code. The SDAP manageability code may cause the processing logic to provide a sensor type and a measurement data payload type to a mobile communication device. The SDAP manageability code additionally may cause the sensor head to take a measurement, receive measurement data from the sensor head, packetize the measurement data, and transfer the measurement data payload to the mobile communication device. | 10-25-2012 |
20120284499 | METHOD AND APPARATUS WITH CHIPSET-BASED PROTECTION FOR LOCAL AND REMOTE AUTHENTICATION OF BOOTING FROM PERIPHERAL DEVICES - Method and apparatus enabling a computing system to deter or thwart unauthorized boot-up from peripheral devices are disclosed herein. In various embodiments, a monitoring module and a managing module are employed cooperating with each other to authorize users in booting up the computing system from peripheral devices. | 11-08-2012 |
20130003502 | CONFIGURABLE ULTRASOUND MEASUREMENT LOGIC IN A MOBILE COMPUTING DEVICE - A device, system, method, and machine readable medium for configurable ultrasound Doppler measurements from a mobile device are disclosed. In one embodiment, the device includes an oscillator capable of generating an ultrasound frequency sound wave. The device also includes an ultrasound emission module capable of emitting a first ultrasound wave at a first frequency and at a first power level and a second ultrasound wave at a second frequency and at a second power level. The device also an ultrasound receiver and amplifier module capable of receiving and amplifying ultrasound emission waves. The device also includes processing logic capable of receiving the first and second ultrasound waves and displaying those waves on a display device. | 01-03-2013 |
20130003963 | Thwarting Unauthorized Content Copying Using Media Tracking Code - Embodiments of techniques and systems for content protection and detection of protected media content are described. Visual tracking patterns may be displayed during rendering of protected media content that would be visible to a camcorder during recording. The visual tracking pattern may be placed in a background area or other less-active portion of the video in order to reduce perceptibility by a viewer. Audio tracking patterns may be inserted during rendering outside of the range of normal human hearing for reduced viewer perceptibility. The tracking patterns may encode media tracking codes that are included in to-be-rendered media during provision from a media server. Other embodiments may be described and claimed. | 01-03-2013 |
20130006866 | METHOD AND APPARATUS FOR DYNAMIC, REAL-TIME AD INSERTION BASED ON META-DATA WITHIN A HARDWARE BASED ROOT OF TRUST - A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content. | 01-03-2013 |
20130007873 | SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION - Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code. | 01-03-2013 |
20130091590 | ENABLING A SERVICE TO RETURN LOST LAPTOPS - A method, system, and computer-readable storage medium for providing a unique identifier for a computer system and a message from a service external to the computer system, such as a laptop return service, for display when the computer system is powered on. The computer system is configured to restrict functionality until the service authorizes restoration of full functionality of the computer system. The message includes contact information for the laptop return service and, when the service is contacted, the service sends an instruction to return the computer system to full functionality. Other embodiments are described and claimed. | 04-11-2013 |
20130125218 | METHOD, APPARATUS AND SYSTEM FOR REMOTE MANAGEMENT OF MOBILE DEVICES - An apparatus and system for enabling users to remotely manage their devices. Specifically, in one embodiment, in the event of a theft of a device or other such occurrence, a user may send a command to the device to execute a specified command. The command may include actions such as locking the device, shutting down the device, disabling logon's to the device and other such actions that may secure the device and the data on the device from unauthorized access. Upon receipt of an authorized unlock credential, the device may once again be made accessible. | 05-16-2013 |
20130283182 | MECHANISM FOR FACILITATING PROXY USER INTERFACE-BASED REMOTE MANAGEMENT AND CONTROL OF COMPUTING AND NON-COMPUTING DEVICES - A mechanism is described for facilitating proxy user interface-based remote management and control of computing devices according to one embodiment of the invention. A method of embodiments of the invention includes remotely pairing a first device with a second device, and remotely controlling the second device via a user interface provided at the first device. The user interface may serve as a proxy user interface at the first device for remotely controlling the second device. The first device may include a first computing device, and wherein the second device may include a second computing device or a second non-computing device. | 10-24-2013 |
20130318576 | METHOD, DEVICE, AND SYSTEM FOR MANAGING USER AUTHENTICATION - A method, device, and system for managing user authentication includes receiving authentication constraints of authentication data used to authenticate a user of a first computing device, such as a mobile computing device, to a second computing device, such as a financial data, e-commerce server or cloud-based service server. The first computing device automatically generates authentication data as a function of the authentication constraints. The authentication data may be embodied as a strong password and username. The authentication data may be updated or regenerated periodically or responsively to further increase the security of the authentication data. The user authentication data, authentication constraints, and history of transactions may be performed in a secure execution environment to further increase the security of the method, device and system. | 11-28-2013 |
20130322648 | MULTI-STREAM-MULTIPOINT-JACK AUDIO STREAMING - A method and device for streaming the output of one or more audio sources to one or more smart headsets includes establishing a secure connection with a smart headset, associating an audio channel of the one or more audio sources with the smart headset, and streaming the associated audio channel to the smart headset. The audio streaming device may selectively stream one or more audio channels from one or more audio sources to one or more of the smart headsets as a function of a streaming policy. | 12-05-2013 |
20130337793 | BUNDLED MOBILE DEVICE PURCHASE SYSTEM - Generally, this disclosure relates to a bundled mobile device purchase system. The system may include a mobile device and a bundle service. The mobile device may include transponder circuitry configured to receive and store a bundle identifier including an application identifier related to an application, the bundle identifier provided to the transponder circuitry during a transaction that includes purchasing the mobile device and the application. The mobile device may further include memory circuitry configured to receive and store the application after the transaction. The bundle service may include a bundle download module configured to provide the application to the mobile device in response to receiving the application identifier from the mobile device. | 12-19-2013 |
20130339234 | METHOD AND SYSTEM FOR MOBILE COMMERCE WITH REAL-TIME PURCHASE SUPPORT - A method and system provides the user of a computing device with information, analysis, suggestions and/or recommendations relating to the user's financial information and/or purchasing history, in relation to an electronic commerce transaction initiated by the user at the computing device, prior to, during, or after completion of the electronic commerce transaction. | 12-19-2013 |
20130339496 | ENTERPRISE DEVICE CONFIGURATION SYSTEM - The present disclosure generally relates to a system and method for enterprise device customization. An example system may comprise an enterprise customization service and a device. The enterprise customization service may be configured to provide at least one of configuration or software to the device based on enterprise customization data. The device may include at least an enterprise customization application and the enterprise customization data. The enterprise customization application may be configured to cause the enterprise customization service to at least one of configure the device or to download software to the device based on the enterprise customization data. | 12-19-2013 |
20130339852 | STREAM-BASED MEDIA MANAGEMENT - The present disclosure provides systems and methods for stream-based media management. A device may be configured to receive information streams including displayable content and to at least display the displayable content. For example, a stream manager in the device may be configured to control how the displayable content is displayed on a display in the device based on activity detected in the information streams. The activity may be defined by user preferences as trigger activities. For example, upon detecting a trigger activity in an information stream, the stream manager may cause the displayable content to be displayed or hidden, may cause the manner in which the displayable content is displayed (e.g., size, shape, order, etc.) to be altered, or may cause a visible or audible alert to be generated. | 12-19-2013 |
20130340034 | APPLICATION AUTHENTICATION POLICY FOR A PLURALITY OF COMPUTING DEVICES - In one embodiment, the present invention includes a method for launching an application authentication policy (AAP) application on a computing device, enabling the device for use as a personal device of a user if the user is authenticated by the AAP application, and otherwise enabling the device for use as a non-personal device that provides only basic functionality but protects other users' personal data and applications. Other embodiments are described and claimed. | 12-19-2013 |
20130346316 | METHOD AND APPARATUS FOR DYNAMIC, REAL-TIME AD INSERTION BASED ON META-DATA WITHIN A HARDWARE BASED ROOT OF TRUST - A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content. | 12-26-2013 |
20130346740 | SECURE USER PRESENCE DETECTION AND AUTHENTICATION - This disclosure relates generally to a system and method for authenticating an electronic device may comprise a server configured to transmit an encrypted object, the encrypted object having an image file format, to the electronic device, the encrypted object being encrypted based on a certificate, the electronic device operatively coupled to the server and comprising a processor registered with the server to create a secured communication link between the processor and the server, wherein the certificate corresponds to the processor, the processor having a cryptographic engine configured to decrypt the encrypted object to result in a decrypted graphic, and a user interface operatively coupled to the processor. The user interface may be configured to display the decrypted graphic and receive a user input responsive to the decrypted graphic. The server may authenticate the electronic device based, at least in part, on the user input. | 12-26-2013 |
20130347025 | PROVIDING REMOTE ACCESS VIA A MOBILE DEVICE TO CONTENT SUBJECT TO A SUBSCRIPTION - In one embodiment, the present invention includes a method for accessing content subscription information from a secure storage of a mobile device, communicating the content subscription information to an authorization service of a content provider with a request to receive content, receiving in the mobile device an authorization from the content provider which includes a time bound identifier corresponding to a time bounded authorization to receive the content during a time bounded window, and receiving and outputting the content from the mobile device during the time bounded window. Other embodiments are described and claimed. | 12-26-2013 |
20140004825 | MOBILE PLATFORM SOFTWARE UPDATE WITH SECURE AUTHENTICATION | 01-02-2014 |
20140006798 | DEVICE, SYSTEM, AND METHOD FOR PROCESSOR-BASED DATA PROTECTION | 01-02-2014 |
20140013136 | POWER EFFICIENT LOCATION NOTIFICATION - Before a device enters a power saving mode, a location-aware application in the device may provide at least one wake trigger (and a trigger limit) to a low power monitoring module (LPMM). In power saving mode, the LPMM receives device locations from a location service module and may determine when the device location corresponds to the at least one wake trigger or trigger limit. In one embodiment, device location may only be provided to the LPMM based on a condition (e.g., timer expiration or reaching a displacement threshold as measured by sensors in the device). When device location corresponds to the trigger limit, the LPMM may notify the device (e.g., cause a transition to an active power mode) so that the location-aware application can redetermine the at least one wake trigger. The device location corresponding to the at least wake trigger may also cause the LPMM to notify the device. | 01-09-2014 |
20140015987 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 01-16-2014 |
20140032327 | COMMUNICATION SYSTEM INCLUDING DIGITAL SIGNAGE AND RELATED MOBILE CONTENT - A system may include a signage controller configured to control digital signage (e.g., at least one digital display). In one embodiment, the signage controller may collect and compile demographic information and feedback from mobile devices via close-proximity or short-range communication prior to providing it to cloud resources. The cloud resources may then determine content and mobile content based on the demographic information and feedback. At least the content may be provided to the signage controller, which may cause the digital signage to display some of the content (e.g., at least one advertisement). The mobile content may be pushed to the mobile devices, and may cause the mobile devices to display information and/or provide functionality related to the displayed content. In one embodiment, statistics (e.g., at least one of offer availability or offer acceptance statistics corresponding to the at least one advertisement) may also be displayed on the digital signage. | 01-30-2014 |
20140046727 | METHOD, DEVICE, AND SYSTEM FOR GENERATING ONLINE SOCIAL COMMUNITY PROFILES - A device, method, and system for generating online social community profiles includes collecting behavioral characteristics of community members of an online social community and aggregating the behavioral characteristics to generate a social community profile for the online social community. The social community profile may be used to elicit proposals from vendors, which may be voted on or responded to by the community members of the online social community. | 02-13-2014 |
20140046784 | METHOD AND SYSTEM FOR MANAGING MULTIPLE ELECTRONIC USER WALLET DATA CARDS - A method and device for managing and storing a plurality of electronic gift cards for use during a payment transaction includes receiving electronic information corresponding to a plurality of gift cards and securely storing the information in storage of a smartcard device as electronic gift cards. The smartcard device may monitor for a request to selectively activate an electronic gift card of the plurality of electronic gift cards for use during a payment transaction. The smartcard device may receive and transmit information corresponding to a selected electronic gift card using a near-field communication (NFC) data exchange. | 02-13-2014 |
20140047428 | AUTOMATED MODULAR AND SECURE BOOT FIRMWARE UPDATE - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 02-13-2014 |
20140075496 | MOBILE PLATFORM WITH SENSOR DATA SECURITY - Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data. | 03-13-2014 |
20140075550 | HARDWARE-ENFORCED ACCESS PROTECTION - The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device. | 03-13-2014 |
20140089507 | APPLICATION INDEPENDENT CONTENT CONTROL - Systems and techniques for application independent content control are described herein. It may be determined that a content filter is enabled for a computing device. The content filter may include a restricted term. A content container may be identified in a device buffer of the computing device. The content container may also include the restricted term. A portion of the content container corresponding to the restricted term may be modified in the device buffer to block the restricted term. | 03-27-2014 |
20140090091 | MANAGING PERSONAL PRIVACY SETTINGS - Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device. | 03-27-2014 |
20140091831 | ENFORCING PERFORMANCE LONGEVITY ON SEMICONDUCTOR DEVICES - Technologies for enforcing an expiration policy on an electronic engineering sample component includes a one-time programmable fuse to store a manufacture date of the electronic engineering sample component, another one-time programmable fuse to store an expiration date of the electronic engineering sample component, and a component life management engine to compare a current date of the electronic engineering sample component with the expiration date of the electronic engineering sample component. The component life management engine to disable or lock the electronic engineering sample component in response to determining that the current date of the electronic engineering sample component exceeds the expiration date of the electronic engineering sample component. In some embodiments, a computing device may enforce the expiration policy for the electronic engineering sample component. The computing device may also be communicatively coupled to a remote unlock server and may receive authorization to unlock a disabled engineering sample component. | 04-03-2014 |
20140092004 | AUDIO INFORMATION AND/OR CONTROL VIA AN INTERMEDIARY DEVICE - The present disclosure is directed to systems and methods related audio information and/or control via intermediary device. For example, a system may comprise a monitor, a peripheral device and a mobile device. The monitor may be configured to present multimedia information based on remote control information received in the monitor over, for example, a wired or wireless HDMI connection. Remote control information may include commands for controlling operation of the monitor when presenting the multimedia information. The peripheral device may be configured to reproduce sound associated with the multimedia information based on audio information received via, for example, wireless communication such as Bluetooth or WLAN. The mobile device may be configured to provide the remote control information to the monitor (e.g., via the wired or wireless HDMI connection) and to provide the audio information to the peripheral device (e.g., via the Bluetooth or WLAN wireless communication). | 04-03-2014 |
20140093083 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 04-03-2014 |
20140094989 | MECHANISM FOR FACILITATING REAL-TIME CONTEXT-AWARE MESSAGES FOR VEHICLE-BASED AND OTHER COMPUTING DEVICES - A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed. | 04-03-2014 |
20140095664 | METHODS AND SYSTEMS FOR DYNAMIC MEDIA CONTENT OUTPUT FOR MOBILE DEVICES - Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile device may receive selection input pertaining to generating output from a media file containing at least two of audio data, video data, and closed-captioning data, the selection input selecting at least one of audio, video, and closed-captioning to be output during play of the media content. In some embodiments, the mobile device may generate an audio output as a signal in response to the selection input including audio. In some embodiments, the mobile device may generate a video output as a signal in response to the selection input including video. In some embodiments, the mobile device may generate a closed-captioning output as a signal in response to selection input including closed-captioning. | 04-03-2014 |
20140104043 | CONTEXT AWARE DETECTION AND MOBILE PLATFORM WAKE - A device includes a processor having a standby state, a control unit coupled to the processor to receive wireless identification information, and a storage device to store a processor wake policy. The control unit applies the policy to received wireless identification information to wake the processor. | 04-17-2014 |
20140143147 | TRANSACTION FEE NEGOTIATION FOR CURRENCY REMITTANCE - Described herein are systems and methods for conducting remittances transactions with mobile and other electronic devices. In some embodiments, the systems and methods permit a user of a mobile or other electronic device to query multiple service providers for fee information from a single location. And in some instances, such fee information is provided to the user in real time. | 05-22-2014 |
20140164060 | SYSTEMS AND METHODS FOR FORECASTING DISCOUNTS USING CROWD SOURCE INFORMATION - Systems and methods for forecasting discounts are described herein. In some embodiments, the systems and methods utilize marketplace information to calculate an initial probability that an item will be subject to a discount within a specified time period. The systems and methods may then utilize relevant crowd source information to weight the marketplace information and output a weighted probability of sale. | 06-12-2014 |
20140169634 | SYSTEM, DEVICE, AND METHOD FOR DETECTING AND LOCATING WANTED VEHICLES - A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile communication device and an in-vehicle computing system. Scanning data may be retrieved from a scanning data server by the mobile communication device and, in some embodiments, forwarded to the in-vehicle computing system. A vehicle-base camera may be used to capture one or more images. An image analysis module of the in-vehicle computing system or mobile communication device may be used to analyze the captured image(s) for a match between the image(s) and the scanning data. In response to identifying a match, the mobile communication device may notify the scanning data server of the identified match. | 06-19-2014 |
20140173271 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 06-19-2014 |
20140179236 | HEADLESS EXTERNAL SENSOR DISCOVERY AND DATA ACCESS USING MOBILE DEVICE - A device, system, and machine-readable medium for headless sensor measurements are disclosed. In one embodiment, the device is exclusive of a display. The device includes a sensor head to retrieve an amount of measurement data from an environment. The device also includes an I/O interface, a memory, a non-volatile storage, processing logic, and sensor data access protocol (SDAP) manageability code. The SDAP manageability code may cause the processing logic to provide a sensor type and a measurement data payload type to a mobile communication device. The SDAP manageability code additionally may cause the sensor head to take a measurement, receive measurement data from the sensor head, packetize the measurement data, and transfer the measurement data payload to the mobile communication device. | 06-26-2014 |
20140181691 | SHARING OF SELECTED CONTENT FOR DATA COLLECTION - Private information can be collected from a receiving computing device user via a requesting computing device sharing selected content presented on a requesting device display with the receiving device. Communication between the devices can be secure, peer-to-peer and can be established using Near Field Communication technologies. The selected content comprises data fields for which a receiving device user supplies data values. The requesting computing device can update the presented selected content based on the received receiving user input and send updated display information to the receiving device. Alternatively, the receiving device can send data fields to the requesting device as data fields are fully entered. The selected content shared with and the data values received from the mobile device can be translated into other languages. Cloud resources can be involved in the pairing and authentication of devices, the translation of data sent between devices and the communication of data between devices. | 06-26-2014 |
20140188719 | MULTI USER ELECTRONIC WALLET AND MANAGEMENT THEREOF - Systems and methods for sharing an e-wallet are disclosed. In some embodiments, the systems and methods may share an e-wallet among multiple users on a single device. In other embodiments, the systems and method may share an e-wallet among multiple devices and/or multiple users on multiple devices. In some instances, an remotely stored e-wallet may be used or leveraged by an e-wallet uncertified device. | 07-03-2014 |
20140189017 | COMPREHENSIVE TASK MANAGEMENT - Technologies for generating tasks from communication messages includes a mobile computing device for monitoring communication messages, parsing the communication messages to detect content indicative of upcoming tasks, generating a task for each of the upcoming tasks detected, generating a task list from the generated tasks, and generating an alarm for each task. Additionally, the mobile computing device receives tasks generated by a cloud server. | 07-03-2014 |
20140189392 | COMMUNICATION LINK AND NETWORK CONNECTIVITY MANAGEMENT IN LOW POWER MODE - Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as “links”) in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed. | 07-03-2014 |
20140195361 | METHOD AND SYSTEM FOR ACTIVE RECEIPT MANAGEMENT - A method and device for managing and storing a plurality of electronic receipts includes receiving transaction data corresponding to a product purchased during a purchase transaction with an electronic receipt server. The electronic receipt server may parse the transaction data to retrieve information describing an aspect or a detail of the purchased product or the purchase transaction. The retrieved information may be stored in storage of the electronic receipt server as an electronic receipt. One or more electronic receipts of a plurality of electronic receipts stored in the electronic receipt server may be accessed and managed from an application executing on a computing device or a mobile computing device. | 07-10-2014 |
20140208340 | DYNAMIC CONTENT RATING MANAGEMENT ACROSS A VARIETY OF TELEVISION INPUT SOURCES - Generally, this disclosure describes a system and method for dynamic content management across a variety of television input sources. The system may include an audience detection module configured to identify a viewer in a viewing area of a display configured to display received media content; a media scanning module configured to determine a media content rating associated with a portion of a media content received from at least one of a local content source and a remote content source; and a media player configured to adapt display of the portion of the received media content based on a policy when the associated media content rating corresponds to inappropriate content for the identified viewer. | 07-24-2014 |
20140212051 | METHOD AND APPARATUS FOR CONTROLLING CONTENT CAPTURE OF PROHIBITED CONTENT - Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis. | 07-31-2014 |
20140222578 | DIGITAL SIGNAGE MANAGEMENT SYSTEM - Generally, this disclosure describes a digital signage management system. The system may include a user device including processor circuitry coupled to communication circuitry, the communication circuitry configured to couple the user device to at least one of a digital sign and a management service, and the user device configured to manage display of user content on the digital sign, the user content configured to be displayed on the digital sign in a time slot. | 08-07-2014 |
20140247373 | MULTIPLE LENSES IN A MOBILE DEVICE - Generally, this disclosure describes multiple lenses in a mobile device. A mobile device may include a housing including a first surface, an opposing second surface and third, fourth, fifth and sixth surfaces connecting the first surface and the second surface forming the housing; a plurality of lenses, each lens configured to capture a respective image, each lens positioned relative to the housing so that a respective lens axis associated with each lens is perpendicular within a tolerance to at least a portion of at least one surface and a first lens axis associated with a first lens is perpendicular within the tolerance to a second lens axis associated with a second lens; at least one image sensor coupled to the plurality of lenses, configured to convert each captured image into respective image data; and circuitry configured to receive and process the image data. | 09-04-2014 |
20140280840 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING A UNIVERSAL PERSISTENCE CLOUD SERVICE - Methods, systems, and computer program products that relate to managing persistence information of client devices for services registered with a persistence cloud service. A method from the perspective of a computing device associated with a registered service may include receiving, from a client device, a device identifier that identifies the client device to the registered service. The method further may include requesting, from a persistence cloud server associated with the persistence cloud service, persistence information associated with the device identifier. The method may also include receiving the persistence information, determining a level of service to provide to the client device based on the persistence information, and providing the level of service to the client device. The computing device may, for example, be a server associated with the registered service, or may, for example, be a router. | 09-18-2014 |
20140281490 | ONE-TOUCH DEVICE PERSONALIZATION - Technologies for one-touch device personalization include at least two mobile computing devices configured to communicate with a personalization server. The first mobile computing device tracks changes to device personalization data and backs up the personalization data to the personalization server. The personalization server associates the personalization data to authenticated user credentials. The personalization server may store the personalization data in an operating-system-independent format. Later, a second mobile computing device sends a request for personalization including those user credentials. After authenticating the user credentials, the personalization server sends the personalization data to the second mobile computing device, which installs the personalization data. Installing the personalization data establishes a configuration of the second mobile computing device corresponding to a previous configuration of the first mobile computing device. For increased convenience and security, the user credentials may be stored on a smart card or other security device. Other embodiments are described and claimed. | 09-18-2014 |
20140283018 | MECHANISMS FOR LOCKING COMPUTING DEVICES - Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated. | 09-18-2014 |
20140289640 | LAYOUT FOR DYNAMIC WEB CONTENT MANAGEMENT - A request for content is sent via a client device. The client device negotiates with a server content provider regarding the layout of the content using a dynamically configurable content layout profile describing layout preferences for content. When the content is received from the server content provider, the content is displayed according to the dynamically configurable content layout profile. The server may format the content in accordance with the profile and send the formatted content to the client device via a network. A user of the device may modify the profile dynamically to specify a different layout and receive reformatted content. | 09-25-2014 |
20140289789 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 09-25-2014 |
20140289831 | WEB AUTHENTICATION USING CLIENT PLATFORM ROOT OF TRUST - Systems and methods for performing web authentication using a client platform root of trust are disclosed herein. Website and user validity and integrity may be authenticated based on the user device's attempt to access the website. A user device may securely access the website once the user device is successfully authenticated with a server. In an embodiment, the user device may perform an authentication of the website to ensure the website is a valid entity. | 09-25-2014 |
20140297823 | CLOUD BASED VIRTUAL MOBILE DEVICE - Systems and techniques for a cloud based virtual mobile device are described herein. A virtual mobile device may be initialized to correspond to a physical mobile device. The virtual mobile device may include a representation of a physical mobile device operating environment. A service request for the physical mobile device operating environment may be received. The service request may be fulfilled using the representation of the physical mobile device operating environment. | 10-02-2014 |
20140308924 | METHOD AND APARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using near field communication, Bluetooth, direct connect to a PC, or by other secure, local wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic. Other embodiments are described and claimed. | 10-16-2014 |
20140325046 | REMOTE MACHINE MANAGEMENT - Various systems and techniques for remote machine management are described. Simulated device input (SDI) may be received from a source machine at a device driver module of a target machine, the source machine is remote from the target machine. The SDI may correspond to a local target input device serviced by the device driver module. The SDI may be provided to a consumer of the device driver module. A representation of a local target machine graphical display may be transmitted to the source machine including a response to the provided SDI. | 10-30-2014 |
20140325638 | COMPUTING DEVICE SECURITY - Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally: a maintenance credential proximate the computing: device can be detected. Furthermore, an alarm system within the computing device can be disabled in response to detecting an authorized maintenance credential. | 10-30-2014 |
20140358713 | METHOD AND SYSTEM FOR BULK PURCHASE NEGOTIATING USING AN AD HOC ONLINE GROUP - A method and system enables the formation of an ad hoc group to negotiate a bulk purchase of a product or service in an online user networking environment and to execute the bulk purchase using an electronic commerce transaction. | 12-04-2014 |
20140362236 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 12-11-2014 |
20150019427 | SECURELY GENERATING TIME AND LOCATION BOUNDED VIRTUAL TRANSACTION CARDS USING MOBILE WALLETS WITHOUT INVOLVING THIRD PARTIES OR POINT OF SALE TERMINALS - Methods and systems may provide for generating a virtual transaction card based on a card value and one or more mobile usage constraints including a time bounded policy, wherein the virtual transaction card is invalid if the time bounded policy is not satisfied. Additionally, the virtual transaction card may be transmitted to a delegate mobile device. Other mobile usage constraints, such as location bounded policies and type of transaction policies may also be used. | 01-15-2015 |
20150019869 | ONLINE IDENTIFICATION AND AUTHENTICATION - Systems and methods may provide for online identification and authentication. In one example, the method may include generating a credential to represent a relationship based on a common ground of authenticated communication between a first user and a second user, identifying the second user to the first user, authenticating the relationship of the second user to the first user, and initiating, upon authentication, a communication between the first user and the second user. | 01-15-2015 |
20150024680 | PROXIMATE COMMUNICATION WITH A TARGET DEVICE - Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a perforated operation. | 01-22-2015 |
20150046698 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 02-12-2015 |