SECURE PEER-TO-PEER NETWORK SETUP

    公开(公告)号:EP2752077B1

    公开(公告)日:2018-08-15

    申请号:EP11871405.4

    申请日:2011-09-01

    申请人: Intel Corporation

    摘要: Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master device. The wireless processing unit is operable to receive encoded data in a two-dimensional (2D) barcode. The encoded data comprise at least user information associated with the master device including a user identifier, a device identifier, or both. The encoded data further comprise network information including a network identifier, a password, and a profile lifetime value. In one embodiment, the apparatus further comprises a display unit to display at least part of the user information and the network information to a user. The wireless processing unit is operable to initiate a peer-to-peer network setup with the master device based at least on a response from the user.

    SECURE PEER-TO-PEER NETWORK SETUP
    2.
    发明公开
    SECURE PEER-TO-PEER NETWORK SETUP 有权
    外管局P2P网络设置

    公开(公告)号:EP2752077A1

    公开(公告)日:2014-07-09

    申请号:EP11871405.4

    申请日:2011-09-01

    申请人: Intel Corporation

    摘要: Apparatuses for peer-to-peer network setup are presented. In one embodiment, an apparatus comprises a wireless processing unit to communicate with a master device. The wireless processing unit is operable to receive encoded data in a two-dimensional (2D) barcode. The encoded data comprise at least user information associated with the master device including a user identifier, a device identifier, or both. The encoded data further comprise network information including a network identifier, a password, and a profile lifetime value. In one embodiment, the apparatus further comprises a display unit to display at least part of the user information and the network information to a user. The wireless processing unit is operable to initiate a peer-to-peer network setup with the master device based at least on a response from the user.

    METHODS AND SYSTEMS TO SUMMARIZE A SOURCE TEXT AS A FUNCTION OF CONTEXTUAL INFORMATION
    3.
    发明公开
    METHODS AND SYSTEMS TO SUMMARIZE A SOURCE TEXT AS A FUNCTION OF CONTEXTUAL INFORMATION 审中-公开
    方法和系统概述源文本作为上下文信息的功能

    公开(公告)号:EP2668592A2

    公开(公告)日:2013-12-04

    申请号:EP11856929.2

    申请日:2011-12-21

    申请人: Intel Corporation

    IPC分类号: G06F17/20 G06F9/44

    CPC分类号: G06F17/30719

    摘要: Methods and systems to summarize a source text as a function of contextual information, including to fit a summary within a context-based allotted time. The context-based allotted time may be apportioned amongst multiple portions of the source text, such as by relevance. The context-based allotted time and/or relevance may be user-specified and/or determined, such as by look-up, rule, computation, inference, and/or machine learning. During summary presentation, one or more portions of the source text may be re-summarized, such as to adjust a level of detail. A presentation rate may be user-controllable. Where new and/or changed contextual information affects an available time to review a remaining portion of the summary, the summary presentation may be automatically adjusted, and/or one or more portions of the source text may be re-summarized based on a revised context-based allotted time.

    INFORMATION HIDING THROUGH TIME SYNCHRONIZATION
    4.
    发明公开
    INFORMATION HIDING THROUGH TIME SYNCHRONIZATION 审中-公开
    信息通过时间同步奖

    公开(公告)号:EP1644793A1

    公开(公告)日:2006-04-12

    申请号:EP04756541.1

    申请日:2004-06-30

    申请人: Intel Corporation

    IPC分类号: G06F1/00

    CPC分类号: G06F21/36 G06F21/34

    摘要: Authenticating a user operating a portable computing device includes causing a sequence of images to be shown on a display, accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user's password, the user's password being known by the portable computing device, correlating the input selection to the currently displayed image, and allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user's password.