IDENTITY ATTESTATION OF A MINOR VIA A PARENT
    1.
    发明申请
    IDENTITY ATTESTATION OF A MINOR VIA A PARENT 审中-公开
    通过家长的身份识别

    公开(公告)号:US20160182508A1

    公开(公告)日:2016-06-23

    申请号:US14580985

    申请日:2014-12-23

    IPC分类号: H04L29/06

    摘要: A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security token may include personally identifiable information about the child, a description of authorized activity as well as specifications of intended use of the security token. The security token may include provisions for authentication to be revoked by a parent or guardian and/or expire after a predetermined time. The security token may be stored inside a trusted execution environment of a portable computing device that may be carried by the minor and presented at physical locations where authentication is required.

    摘要翻译: 一种技术允许父母认证的安全令牌作为未成年人的身份认证的身份验证。 安全令牌可以包括关于孩子的个人身份信息,授权活动的描述以及安全令牌的预期用途的规范。 安全令牌可以包括由父母或监护人撤销认证和/或在预定时间之后到期的规定。 安全令牌可以存储在便携式计算设备的可信执行环境中,该便携式计算设备可由未成年人携带并在需要认证的物理位​​置处呈现。

    TECHNOLOGIES FOR CONTROLLING VISION CORRECTION OF A WEARABLE COMPUTING DEVICE
    5.
    发明申请
    TECHNOLOGIES FOR CONTROLLING VISION CORRECTION OF A WEARABLE COMPUTING DEVICE 有权
    用于控制可磨损计算设备的视觉校正的技术

    公开(公告)号:US20160377864A1

    公开(公告)日:2016-12-29

    申请号:US14750923

    申请日:2015-06-25

    摘要: Technologies for controlling vision correction of a wearable computing device includes controlling an opacity of an adjustable lens of the wearable computing device to generate a viewing port through the adjustable lens such that a region defined by the viewing port has an opacity less than a remaining region of the adjustable lens. For example, the opacity of the adjustable lens may be increased except for the region defined by the viewing port. In use, the wearable computing device may adjust the location, size, and/or shape of the viewing port based on a predefined prescription, the direction of the user's gaze, the user's viewing context, and/or other criteria. Additionally or alternatively, an image may be displayed on an external display surface of the adjustable lens. The wearable computing device may include multiple adjustable lens, each of which may be controlled in a similar manner.

    摘要翻译: 用于控制可穿戴计算设备的视力校正的技术包括控制可穿戴计算设备的可调透镜的不透明度,以通过可调节透镜产生观察端口,使得由观察端口限定的区域的透明度小于 可调透镜。 例如,可变透镜的不透明度可以增加,除了由观察口限定的区域之外。 在使用中,可穿戴计算设备可以基于预定义的处方,用户的注视方向,用户的观看环境和/或其他标准来调整观察端口的位置,大小和/或形状。 附加地或替代地,可以在可调透镜的外部显示表面上显示图像。 可穿戴式计算装置可以包括多个可调透镜,每个透镜可以以类似的方式进行控制。

    TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES
    6.
    发明申请
    TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES 有权
    基于恐惧反应来确定威胁评估的技术

    公开(公告)号:US20160189517A1

    公开(公告)日:2016-06-30

    申请号:US14583695

    申请日:2014-12-27

    IPC分类号: G08B21/04

    摘要: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.

    摘要翻译: 基于恐惧响应来确定威胁评估的技术包括监测从位于被监视站点的传感器阵列接收到的传感器数据。 传感器数据可以包括指示被监测位点内的个体的物理行为的行为传感器数据和指示被监测位点内的个体的生理特性的生理传感器数据。 威胁评估可以基于行为传感器数据和生理传感器数据。 在一些实施例中,可以利用与所监视的站点相关的上下文数据来分析行为传感器数据和生理传感器数据,并基于此来确定威胁评估。

    TECHNOLOGIES FOR MANAGING DEVICE FUNCTIONS OF AN INGESTIBLE COMPUTING DEVICE
    7.
    发明申请
    TECHNOLOGIES FOR MANAGING DEVICE FUNCTIONS OF AN INGESTIBLE COMPUTING DEVICE 审中-公开
    用于管理不可忽略的计算设备的设备功能的技术

    公开(公告)号:US20160183878A1

    公开(公告)日:2016-06-30

    申请号:US14583705

    申请日:2014-12-27

    IPC分类号: A61B5/00 A61B5/07

    摘要: Technologies for managing device functions of an ingestible computing device include determining whether adaptation of a device function of the ingestible computing device is required based on sensor data generated by the ingestible computing device. If device function adaption is determined to be required, the ingestible computing device determines a new device function to be performed, obtains program code modules to perform the new device function, and locally compiles the new program code modules to generate executable code. The ingestible computing device may execute the executable code to cause the ingestible computing device to begin performing the new device function. The ingestible computing device may obtain the program code modules from a local function database or via an authenticated wireless communication.

    摘要翻译: 用于管理可摄入计算设备的设备功能的技术包括基于可摄入计算设备生成的传感器数据来确定是否需要适应可摄入计算设备的设备功能。 如果确定需要设备功能适应,则可摄取计算设备确定要执行的新设备功能,获得执行新设备功能的程序代码模块,并且本地编译新的程序代码模块以生成可执行代码。 可摄入计算设备可以执行可执行代码以使可摄入计算设备开始执行新的设备功能。 可摄取计算设备可以从本地功能数据库或经由认证的无线通信获得程序代码模块。

    Technologies for managing security threats to a computing system utilizing user interactions
    8.
    发明授权
    Technologies for managing security threats to a computing system utilizing user interactions 有权
    用于利用用户交互来管理计算系统的安全威胁的技术

    公开(公告)号:US09378364B1

    公开(公告)日:2016-06-28

    申请号:US14583692

    申请日:2014-12-27

    摘要: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.

    摘要翻译: 用于管理计算系统上的安全威胁的技术包括检测对计算系统的安全威胁,确定在计算系统上采用的多个缓解场景以减轻安全威胁,以及实施多个缓解场景。 每个减缓情景包括计算系统要采取的一个或多个威胁缓解动作,用于执行威胁减轻动作的计算系统的一个或多个响应系统以及要采取威胁减轻动作的时间序列。 评估每个减缓情景的结果,并根据结果确定验证的减缓情景。 可以随后训练或习惯计算设备的用户以响应于设计为复制安全威胁的威胁场景,在验证的缓解场景的实施期间请求来自用户的交互来减轻安全威胁。

    HTML SECURITY GATEWAY
    9.
    发明申请
    HTML SECURITY GATEWAY 有权
    HTML安全网关

    公开(公告)号:US20160182537A1

    公开(公告)日:2016-06-23

    申请号:US14580996

    申请日:2014-12-23

    IPC分类号: H04L29/06

    摘要: A technique allows a client computing system with a web browser to receive a web page in response to transmitting a request for content. The web page may include active content, html data and cascading style sheets (CSS). In embodiments, a gateway device may rewrite the web page dynamically by rewriting node identifiers and class names, removing and separating client-side scripts from html data and CSS data, and blocking or disabling execution of the client-side scripts if these scripts contain vulnerable code. A web page may be rewritten based on analysis information provided by a third-party or analyzed at the gateway device.

    摘要翻译: 一种技术允许具有网络浏览器的客户端计算系统响应于发送对内容的请求来接收网页。 该网页可以包括活动内容,html数据和级联样式表(CSS)。 在实施例中,网关设备可以通过重写节点标识符和类名称来动态地重写网页,从html数据和CSS数据中移除和分离客户端脚本以及阻止或禁用客户端脚本的执行,如果这些脚本包含易受攻击的 码。 可以基于由第三方提供的分析信息或在网关设备处​​分析的网页来重写网页。

    APPARATUS AND METHODS FOR PROVIDING RECOMMENDATIONS BASED ON ENVIRONMENTAL DATA
    10.
    发明申请
    APPARATUS AND METHODS FOR PROVIDING RECOMMENDATIONS BASED ON ENVIRONMENTAL DATA 有权
    基于环境数据提供建议的装置和方法

    公开(公告)号:US20150379400A1

    公开(公告)日:2015-12-31

    申请号:US14317513

    申请日:2014-06-27

    IPC分类号: G06N5/02 H04L29/08

    摘要: Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.

    摘要翻译: 描述了基于环境数据和相关联的情境信息提供建议的装置和方法的实施例。 在实施例中,设备可以包括用于接收环境数据的数据收集器和分析模块,用于至少部分地基于第一用户的环境数据相关联的上下文信息来识别第一用户的行为模型。 该装置还可以包括至少部分地基于第一用户的行为模型和/或第二用户的环境数据向第一用户提供推荐的推荐模块。 可以描述和/或要求保护其他实施例。