摘要:
A method and system enables the formation of an ad hoc group to negotiate a bulk purchase of a product or service in an online user networking environment and to execute the bulk purchase using an electronic commerce transaction.
摘要:
Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis.
摘要:
Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as “links”) in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed.
摘要:
Systems and techniques for application independent content control are described herein. It may be determined that a content filter is enabled for a computing device. The content filter may include a restricted term. A content container may be identified in a device buffer of the computing device. The content container may also include the restricted term. A portion of the content container corresponding to the restricted term may be modified in the device buffer to block the restricted term.
摘要:
In one embodiment, the present invention includes a method for accessing content subscription information from a secure storage of a mobile device, communicating the content subscription information to an authorization service of a content provider with a request to receive content, receiving in the mobile device an authorization from the content provider which includes a time bound identifier corresponding to a time bounded authorization to receive the content during a time bounded window, and receiving and outputting the content from the mobile device during the time bounded window. Other embodiments are described and claimed.
摘要:
A method, device, and system for managing user authentication includes receiving authentication constraints of authentication data used to authenticate a user of a first computing device, such as a mobile computing device, to a second computing device, such as a financial data, e-commerce server or cloud-based service server. The first computing device automatically generates authentication data as a function of the authentication constraints. The authentication data may be embodied as a strong password and username. The authentication data may be updated or regenerated periodically or responsively to further increase the security of the authentication data. The user authentication data, authentication constraints, and history of transactions may be performed in a secure execution environment to further increase the security of the method, device and system.
摘要:
A mechanism is described for facilitating proxy user interface-based remote management and control of computing devices according to one embodiment of the invention. A method of embodiments of the invention includes remotely pairing a first device with a second device, and remotely controlling the second device via a user interface provided at the first device. The user interface may serve as a proxy user interface at the first device for remotely controlling the second device. The first device may include a first computing device, and wherein the second device may include a second computing device or a second non-computing device.
摘要:
Techniques are described that can be used to manage drawing requests from applications based in part on whether the drawing requests can be displayed and in part on the power consumption states of hardware in the system. If the drawing request can not be displayed, then a number of responses can take place. For example, instead of providing the drawing request to hardware and the driver provides a zero pixel region to the hardware. In some cases, the driver saves the state changes that would have resulted had the drawing request been performed and the drawing request is rendered to a buffer instead of the hardware being powered-on. Other examples are described herein.
摘要:
Systems and methods for exchanging digital content in an online layered hierarchical market and exchange network are disclosed. A Buyer utilizes one or more Curry functions that are relevant to content to be acquired thereby developing a Margin Future estimate for the received content. Each e-market layer in the hierarchy adds value to the content for use with one or more other e-market layers. Value is added by executing a Margin Function including a Curry function on the content, as defined in the Margin Future. An embodiment includes data, information, knowledge, and wisdom (DIKW) e-market layers. The Margin Future estimate may be recorded with an escrow agent acting as an intermediary with Investors. Once funded, the Buyer may acquire the content from the Seller and apply value added. Payment may be made when the value added content enters the e-market using electronic wallets. Other embodiments are described and claimed.
摘要:
In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals. The service may provide recommendations on how to locate, reach, or avoid the target object or individual. Identifying and tracking an object may be used to locate an individual when the object is correlated with the individual. Individuals may register with the service for purposes of user authentication and for defining privacy authorizations for data related to the identifying the user and user's location to other parties. The service may execute in a trusted execution environment to help preserve privacy. Embodiments may be used for games, geo-caching, finding groups and individuals for meeting up, avoiding objects or individuals, etc. Other embodiments are described and claimed.