Abstract:
PROBLEM TO BE SOLVED: To detect the presence of a human using an electronic device.SOLUTION: The device 100 includes: one or more physical sensors 116-1 to n for supervising one or more physical characteristics of the electronic device; and a security controller 110 communicably connected to the one or more physical sensors 116-1 to n. On receiving a request for verifying the presence of a human operator, the security controller 110 decides whether the human operator is present at the electronic device, based on sensor data 118 which represent the one or more physical characteristics of the electronic device and are received from the one or more physical sensors 116-1 to n. The security controller then generates a response in regard to the human presence, which indicates whether the human operator is present at the electronic device, based on the sensor data.
Abstract:
METHODS AND APPARATUS FOR PROVIDING A COMMUNICATION PROXY SYSTEM EMBODIMENTS OF METHODS AND APPARATUS TO PROVIDE A COMMUNICATION PROXY SYSTEM ARE GENERALLY DESCRIBED HEREIN. OTHER EMBODIMENTS MAY BE DESCRIBED AND CLAIMED. 5
Abstract:
Technologien zum Schutz eines virtuellen Maschinenspeichers einer Rechenvorrichtung enthalten eine virtuelle Maschine (VM), die auf der Rechenvorrichtung instanziiert ist, einen virtuellen Maschinenmonitor (VMM), der auf der Rechenvorrichtung eingerichtet ist, um den Betrieb der VM zu steuern, einen gesicherten Speicher und einen Speichermanager. Der Speichermanager empfängt eine Speicherzugriffsanfrage, die eine virtuelle lineare Adresse enthält (LA), vom VM und führt eine Übersetzung der LA zu einer übersetzten physischen Host-Adresse (HPA) der Rechenvorrichtung unter Verwendung ein oder mehr Seitentabellen durch, die mit der VM und dem VMM verknüpft sind. Der Speichermanager bestimmt, ob eine gesicherte Übersetzungsabbildung von LA auf HPA, die der LA entspricht, gesperrt ist. Falls die Abbildung gesperrt ist, verifiziert der Speichermanager die Übersetzung basierend auf einem Vergleich der übersetzten HPA mit einer HPA, die unter Verwendung der gesicherten Übersetzungsabbildung übersetzt wurde, und führt, falls verifiziert, die Speicherzugriffsanfrage unter Verwendung der übersetzten HPA durch.
Abstract:
Devices, systems, and methods for monitoring and asserting a trust level of a computing device are disclosed. In one illustrative embodiment, a computing device may include a memory having stored therein a persistent trust log, the persistent trust log comprising data relating to historic events influencing a trust level of the computing device, and a security controller configured to detect an event that influences the trust level of the computing device and to write data relating to the event to the persistent trust log.
Abstract:
An embodiment of the invention provides context aware messaging. Such context aware messaging may include delivering communications (e.g., coupons, promotions) to mobile device users based on the device user's context (e.g., physical location, time of day and week, habits, tendencies, and the like). An embodiment includes sensing an environmental condition for a user; wirelessly communicating the sensed condition to a remotely located node; and receiving a context based communication in response to communicating the sensed condition to the remotely located node; wherein the context based communication corresponds to the sensed environmental condition. Other embodiments are described herein.
Abstract:
An electronic device may be provided that includes a first processor and a second processor, the first processor to wirelessly receive a data packet from another device, and to determine a property (or type) of the received data packet. When the property or type of the received data OTHER DEVICE packet is a first property or first type then the first processor to process the data packet. On the other hand, when the property or type of the received data packet is a second property or second type then the second processor to process the data packet.
Abstract:
Systems and methods for generating suggestions based on group criteria. A device may act as a proxy for a group and scan information from other devices in the group. The proxy device may then transmit the scanned information to a remote resource. The remote resource may obtain preference information based on profile information, for devices that are determined to be registered with a service, and based on inquiry responses for unregistered devices. The preference information may be compiled into group criteria that may be employed in making one or more suggestions to the group. If the group selects one of the suggestions then the remote resource may make arrangements based on the selection. Otherwise, additional suggestions may be provided to the group. The remote resource may also monitor the group and continue to make suggestions accordingly.