摘要:
Generally, this disclosure describes a digital signage management system. The system may include a user device including processor circuitry coupled to communication circuitry, the communication circuitry configured to couple the user device to at least one of a digital sign and a management service, and the user device configured to manage display of user content on the digital sign, the user content configured to be displayed on the digital sign in a time slot.
摘要:
A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed.
摘要:
Embodiments of apparatus, packages, computer-implemented methods, systems, devices, and computer-readable media are described herein for a mobile computing device with a primary processing unit configured to operate in a normal mode and a reduced power mode. The mobile computing device may include a secondary processing unit, coupled with the primary processing unit, configured to provide, to a remote computing server, location data of the mobile computing device. The secondary processing unit may be configured to receive, from the remote computing server, one or more POIs contained within a geofence, identified based on the provided location data. The providing and receiving may be performed on behalf of the primary processing unit while the primary processing unit is in the reduced power mode. Operation of the secondary power processing unit may require less power than operation of the primary processing unit in the normal mode.
摘要:
The present disclosure describes a method and apparatus for determining a safety level of a requested uniform resource locator (URL) on a mobile device. Secure memory may be configured to host at least one database comprising a plurality of uniform resource locators (URLs) and to also host information representing at least one logo indicative of a safety level of the URLs in the database. Secure circuitry may be configured to compare a requested URL with the database to determine if the requested URL corresponds to one of the URLs of the database and to select an appropriate logo stored in the secure memory. The secure circuitry may be further configured to direct overlay circuitry to blend the appropriate logo onto rendered data from a frame buffer video memory for display to a user.
摘要:
Systems, devices and methods are described including receiving a policy from a secure storage device, where the policy may be used to implement collaborative rendering of image content. The image content may include multiple portions of image content. The policy may be used to determining rendering assignments for multiple mobile devices where the assignments may specify that a mobile device is to render one content portion while another mobile device is to render another content portion. The rendering assignments may be provided to the mobile devices and rendered output corresponding to the different content portions may be received from the mobile devices. The rendered output may then be assembled into one or more image frames and wirelessly communicated to a remote display.
摘要:
Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key.
摘要:
The present disclosure describes a method and apparatus for collaborative threat detection on mobile devices. A mobile device may comprise a processor, secure memory, and secure circuitry. The processor may be coupled to host memory and may be configured to execute a security threat detection application to detect a malicious program attacking the mobile device. The secure memory may be configured to host a collaborator database comprising data corresponding to at least one collaborating device. The secure circuitry may be configured to determine if the security threat detection application running on the processor is properly operating. If an abnormality in the operation of the security threat detection application is detected, the secure circuitry may be further configured to cause a security threat notification to be transmitted to the collaborating device based on the data in the collaborator database.
摘要:
A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device.
摘要:
A system for trust brokering as a service includes an edge computing node and a trust brokering service edge computing device. The trust brokering service edge computing device receives a computing workload request from an application configured to process secure data and identifies a set of security requirements associated with the request. The device also identifies a security feature present in the set of security requirements but not provided by the edge computing node. To address this, the device generates an application execution environment that includes a secure plugin providing the security feature and a virtual device representing the edge computing node. The computing workload request is then executed at the application execution environment, providing a secure and efficient solution for trust brokering as a service.
摘要:
Technologies for anonymizing sensor data of an Internet-of-Things (IOT) sensor cloud include receiving sensor data from an IOT sensor of the sensor cloud and determining a mapping for the sensor data that identifies one or more processes to be applied to the sensor data to convert the sensor data to synthetic data, which includes less personal identifiable characteristics of the user than the sensor data. The sensor data is synthesized using the determined mapping to generate the synthetic data, which is subsequently transmitted to a remote service for processing. Responses from the remote service may be de-synthetized to produce personalized responses for the user using the determined mapping.