摘要:
Technologies for manufacturing an engineered biological system include determining a plurality of functions to be performed by the engineered biological system while in a corresponding state. The engineered biological system is to transition between states based on the presence of a corresponding transition trigger defined by a biological key associated with each state. A state machine mapping is generated for the manufacture of the engineered biological system. The engineered biological system is verified and subsequently activated in a host. An engineered biological system and associated method for performing a biological function are also disclosed.
摘要:
Technologies for managing social relationships of a computing device social group includes exchanging device attributes amongst the members of the computing device social group, determining a social relationship between members, and sharing a social interaction policy based on the social relationship. The social interaction policy and the social relationship are used to define and control interactions of members of the computing device social group.
摘要:
Technologies for managing network privileges of members of graft-network include detecting a computing device in physical presence with a network infrastructure, determining whether the computing device is a member of the graft-network, and establishing initial network privileges for the computing device if the computing device is not a member, without direct programming of the member. The network privileges of members of the graft-network are updated over time as a function of the length of time for which the computing device is in physical presence of the network infrastructure. A computing device may be in physical presence of the network by physical contacting a communication bus of the network infrastructure or being within a limited communication range of the communication bus. New members to the graft-network may be quarantined to reduce risk to the network.
摘要:
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
摘要:
Generally, this disclosure provides systems, devices, methods and computer readable media for application installation security and privacy evaluation and indication. The system may include an application installation module configured to receive an application package for installation on a device, wherein the package comprises a list of device resources to be accessed by the application. The system may also include memory configured to store an impact score table comprising one or more security impact scores, each security impact score associated with access to one of the device resources. The system may further include a security/privacy evaluation module configured to calculate a security impact indicator (SII) based on a sum of the security impact scores selected by the accessed device resources listed in the package.
摘要:
A method, apparatus and system enable access control and intrusion detection on encrypted data. Specifically, application data on a node may be routed to a partition on the computing platform. The partition may utilize Direct Memory Access (“DMA”) to access session key stored in system memory of a host operating system on the platform. The partition may thereafter utilize the session key to perform intrusion detection on encrypted data from the application running under the host operating system. Other embodiments may be described and claimed.
摘要:
An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior.