Abstract:
Various embodiments are generally directed an apparatus and method for processing an encrypted graphic with a decryption key associated with a depth order policy including a depth position of a display scene, generating a graphic from the encrypted graphic when the encrypted graphic is successfully decrypted using the decryption key and assigning the graphic to a plane at the depth position of the display scene when the encrypted graphic is successfully decrypted.
Abstract:
Techniques and mechanisms for providing information to represent a course traversed by a mobile device. In an embodiment, navigation logic of the mobile device determines context data other than any geodetic data that specifies a position of the mobile device. With such context data, the navigation logic determines a sequence of estimates each for a respective position of the device on a course traversed by the mobile device. In another embodiment, determining the sequence of estimates includes determining a first estimate of a first position of the mobile device independent of any geodetic data that specifies the first position. Course information representing such a determined sequence includes timestamp information for the first estimate.
Abstract:
An apparatus to collect firmware measurement data at a computing system is disclosed. The apparatus includes a plurality of agents, each including a non-volatile memory storing firmware executed to perform a function associated with the agent, verification logic to generate measurement data by verifying the integrity of the firmware and a register to store the measurement data, and a processor to execute an instruction to collect firmware measurement data from each of the plurality of agents.
Abstract:
Methods and apparatus for invoking a security feature of a computing device display in response to detecting an onlooker based on depth data are disclosed. An example apparatus includes at least one memory, computer-readable instructions, and processor circuitry, The processor circuitry is to execute the computer-readable instructions to automatically invoke an onlooker detection model of a computing device in response to determining that the computing device is located in a public, unsecure environment. The onlooker detection model is to detect an onlooker based on data collected by a sensor associated with the computing device. The processor circuitry is to execute the computer-readable instructions to automatically invoke a security feature of a display of the computing device in response to detection of the onlooker.
Abstract:
Methods and apparatus for invoking a security feature of a computing device display in response to detecting an onlooker based on depth data are disclosed. An example apparatus includes an onlooker detector and a security manager. The onlooker detector is to detect an onlooker based on depth sensor data collected by a depth sensor associated with a computing device. The security manager is to automatically invoke a security feature of a display of the computing device in response to detection of the onlooker by the onlooker detector.
Abstract:
A data processing system with technology to secure a virtual machine control data structure (VMCDS) comprises random access memory (RAM) and a processor in communication with the RAM. The processor comprises virtualization technology that enables the processor to run a virtual machine monitor (VMM) in the data processing system and to run guest software in a virtual machine (VM) that is managed by the VMM. The VM is based at least in part on a VMCDS for the VM. An instruction decoder in the processor recognizes and dispatches a set-mask instruction. The set-mask instruction specifies access restrictions to be imposed on the VMM with respect to the VMCDS of the VM. The processor also comprises a mask enforcer to automatically enforce the access restrictions specified by the set-mask instruction, in response to an attempt by the VMM to access the VMCDS of the VM. Other embodiments are described and claimed.
Abstract:
Methods and apparatus for invoking a security feature of a computing device display in response to detecting an onlooker based on depth data are disclosed. An example apparatus includes an onlooker detector and a security manager. The onlooker detector is to detect an onlooker based on depth sensor data collected by a depth sensor associated with a computing device. The security manager is to automatically invoke a security feature of a display of the computing device in response to detection of the onlooker by the onlooker detector.
Abstract:
Methods, apparatuses and storage medium associated with navigation service are disclosed. In various embodiments, a method may include collecting, by a client mobile device, ambient barometric pressure information at a current location of the client mobile device. The method may further include providing, by the mobile device, contemporaneous navigation assistance to a user of the mobile device or for a user of the mobile device, assisted by a remote navigation assistance service. Assistance by the remote navigation service is associated with determining the current elevation level, based at least in part on ambient barometric pressure information collected by the client mobile device and by one or more crowdsourced mobile devices at the current location. Other embodiments may be disclosed or claimed.