Abstract:
In one embodiment of the present invention, a portable computing device for wireless communications comprises a first network interface for communicating with a public wireless wide area network (WWAN), a second network interface for communicating with a private wireless local area network (WLAN), and a processor executing under control of software instructions, the software instructions defining a gateway protocol, the gateway protocol establishing the portable computing device as an access point within the private WLAN after the wireless presence on the public WWAN is established.
Abstract:
In one embodiment of the present invention, a portable computing device for wireless communications comprises a first network interface for communicating with a public wireless wide area network (WWAN), a second network interface for communicating with a private wireless local area network (WLAN), and a processor executing under control of software instructions, the software instructions defining a gateway protocol, the gateway protocol establishing the portable computing device as an access point within the private WLAN after the wireless presence on the public WWAN is established.
Abstract:
Examples of a system and method for securing data on a computing device are described herein. One or more cryptographic operations are executed on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
Abstract:
A system includes a non-volatile memory to store a page cache that contains pages of data allocated by an operating system, the pages in the page cache being persistent across a power cycle of the system. The page cache is located in a specified region of the non-volatile memory and is to store the pages of data without tagging a memory region.
Abstract:
Examples of a system and method for securing data on a computing device are described herein. One or more cryptographic operations are executed on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
Abstract:
In one embodiment of the present invention, a portable computing device for wireless communications comprises a first network interface for communicating with a public wireless wide area network (WWAN), a second network interface for communicating with a private wireless local area network (WLAN), and a processor executing under control of software instructions, the software instructions defining a gateway protocol, the gateway protocol establishing the portable computing device as an access point within the private WLAN after the wireless presence on the public WWAN is established.
Abstract:
In one embodiment of the present invention, a portable computing device for wireless communications comprises a first network interface for communicating with a public wireless wide area network (WWAN), a second network interface for communicating with a private wireless local area network (WLAN), and a processor executing under control of software instructions, the software instructions defining a gateway protocol, the gateway protocol establishing the portable computing device as an access point within the private WLAN after the wireless presence on the public WWAN is established.
Abstract:
In some examples, securing data on a computing device includes one or more cryptographic operations on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
Abstract:
An example non-transitory computer-readable medium includes instructions that, when executed by a processor, cause the processor to receive a request for data. The instructions also cause the processor to determine a region containing the data based on the metadata. The instructions cause the processor to traverse a tree in the metadata to determine key generation information relating a decryption key for the region to a root key.