摘要:
Technologies for generating tasks from communication messages includes a mobile computing device for monitoring communication messages, parsing the communication messages to detect content indicative of upcoming tasks, generating a task for each of the upcoming tasks detected, generating a task list from the generated tasks, and generating an alarm for each task. Additionally, the mobile computing device receives tasks generated by a cloud server.
摘要:
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display.
摘要:
Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile device may receive selection input pertaining to generating output from a media file containing at least two of audio data, video data, and closed-captioning data, the selection input selecting at least one of audio, video, and closed-captioning to be output during play of the media content. In some embodiments, the mobile device may generate an audio output as a signal in response to the selection input including audio. In some embodiments, the mobile device may generate a video output as a signal in response to the selection input including video. In some embodiments, the mobile device may generate a closed-captioning output as a signal in response to selection input including closed-captioning.
摘要:
Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device.
摘要:
An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display.
摘要:
Before a device enters a power saving mode, a location-aware application in the device may provide at least one wake trigger (and a trigger limit) to a low power monitoring module (LPMM). In power saving mode, the LPMM receives device locations from a location service module and may determine when the device location corresponds to the at least one wake trigger or trigger limit. In one embodiment, device location may only be provided to the LPMM based on a condition (e.g., timer expiration or reaching a displacement threshold as measured by sensors in the device). When device location corresponds to the trigger limit, the LPMM may notify the device (e.g., cause a transition to an active power mode) so that the location-aware application can redetermine the at least one wake trigger. The device location corresponding to the at least wake trigger may also cause the LPMM to notify the device.
摘要:
A method and system provides the user of a computing device with information, analysis, suggestions and/or recommendations relating to the user's financial information and/or purchasing history, in relation to an electronic commerce transaction initiated by the user at the computing device, prior to, during, or after completion of the electronic commerce transaction.
摘要:
Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate.
摘要:
A manageability engine of a processor based device and a host theft-deterrence agent of the processor based device, jointly implement a theft-deterrence protocol with a theft-deterrence service, remotely disposed from the processor based device, to deter theft of the processor based device. The host theft-deterrence agent is configured to operate in a processor operated application execution environment of the processor based device, and the manageability engine is configured to operate outside the application execution environment.
摘要:
A device, system, and machine readable medium for headless sensor measurements are disclosed. In one embodiment, the device is exclusive of a display. The device includes a sensor head to retrieve an amount of measurement data from an environment. The device also includes an I/O interface, a memory, a non-volatile storage, processing logic, and sensor data access protocol (SDAP) manageability code. The SDAP manageability code may cause the processing logic to provide a sensor type and a measurement data payload type to a mobile communication device. The SDAP manageability code additionally may cause the sensor head to take a measurement, receive measurement data from the sensor head, packetize the measurement data, and transfer the measurement data payload to the mobile communication device.