摘要:
A technique allows a parentally attested security token to serve as authentication for a minor using identifying attributes of the minor child. The security token may include personally identifiable information about the child, a description of authorized activity as well as specifications of intended use of the security token. The security token may include provisions for authentication to be revoked by a parent or guardian and/or expire after a predetermined time. The security token may be stored inside a trusted execution environment of a portable computing device that may be carried by the minor and presented at physical locations where authentication is required.
摘要:
Methods, apparatus, systems and articles of manufacture are disclosed to manage password security. An example apparatus includes an alarm action engine to invoke a provisional transmission block in response to detecting entry of a candidate password, a password linkage monitor to retrieve a list of password hash values associated with previously used passwords, and to compare the list of password hash values to a hash of the candidate password, the alarm action engine to invoke a permanent block of the candidate password when a match condition occurs between the hash of the candidate password and a hash of one of the list of password hash values.
摘要:
A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network.
摘要:
A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed.
摘要:
Authentication requirements for a user to access a processing system may be dynamically modified based on status information received from sensors coupled to the processing system. The processing system may receive a request for access to the processing system by the user. The processing system determines an authentication policy based at least in part on the status information, and presents authentication requirements to the user based at least in part on the authentication policy.
摘要:
A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and/or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy.
摘要:
Various embodiments are generally directed to cooperation among networked devices to obtain and use a multiple-frame screenshot. In one embodiment, an apparatus comprises a processor circuit executing a sequence causing the processor circuit to receive a signal conveying a context data; retrieve an aspect of a current context of the apparatus; compare the aspect to the context data; determine whether a context defined as appropriate exists to engage in interactions with one or more other computing devices through a network based on the comparison, the interactions comprising providing a network service to the one or more other computing devices; and engage in the interactions with one or more computing devices through the network when the appropriate context to engage in the interactions exists. Other embodiments are described and claimed herein.
摘要:
Methods and systems to predictively determine to perform a computing activity based on contextual information. Context-based criteria are defined based relationships between user-computing activity and contextual information, and are evaluated based on updated contextual information to determine whether to perform the computing activity. Context-based criteria may be defined to predictively identify content to be transferred/synchronized/updated and/or deleted, and/or to select one or more of multiple devices to receive content. Content may be selectively synchronized across devices of a user and/or shared with another user(s). Context-based criteria may relate to, without limitation, location, activity, computer-usage patterns, motion, and/or schedule of a user, device location, user/device proximity, relationships amongst content, users, and/or devices. Context-based computing environment parameters may be provided to pre-loaded content on device (e.g., store, open, and/or configure an operating system, application, and/or resource), with little or no user interaction.
摘要:
Methods and systems to predictively determine to perform a computing activity based on contextual information. Context-based criteria are defined based relationships between user-computing activity and contextual information, and are evaluated based on updated contextual information to determine whether to perform the computing activity. Context-based criteria may be defined to predictively identify content to be transferred/synchronized/updated and/or deleted, and/or to select one or more of multiple devices to receive content. Content may be selectively synchronized across devices of a user and/or shared with another user(s). Context-based criteria may relate to, without limitation, location, activity, computer-usage patterns, motion, and/or schedule of a user, device location, user/device proximity, relationships amongst content, users, and/or devices. Context-based computing environment parameters may be provided to pre-loaded content on device (e.g., store, open, and/or configure an operating system, application, and/or resource), with little or no user interaction.
摘要:
Described herein are systems and methods for managing and distributing device and/or software settings. In some embodiments, the systems and methods permit a first device to upload settings information and/or user information to a network server. The network server may store such settings information and post it for download by at least one second device. Mechanisms for establishing a trust rating for such settings information are also described.