Abstract:
A set top box or like device incorporating an untrusted software framework as a client of a secure operating system kernel. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment having a secure kernel. The software framework can be executed using a variety of process isolation techniques depending on performance and isolation requirements. A secure access client/server interface may also be provided to support interactions between the untrusted software framework (and applications utilizing the untrusted software framework) and secure or trusted portions of the device. The secure access interface can be configured to perform operations such as handle validation, heap pointer validation, non-pointer parameter validation, heap isolation, and resource release relating to terminated processes. In further embodiments, a software framework aggregator is used to support a plurality of additional software frameworks for use in the set top box.
Abstract:
A social networking environment enables interaction between social networking (SNET) groups. Some interactions between SNET groups can include docking various SNET groups based upon interactions between a member and some part of a social network. Various hierarchies of social networking infrastructure can enable hierarchical interactions between social devices, SNET groups, and other elements associated with various social networking infrastructures. Capabilities provided by various elements in various SNET infrastructures can be docked to create combined SNET groups, and capabilities provided by an SNET group can be accessed via interaction with a representative view of the capabilities. Various interactions can be managed based upon inputs, trigger events, authorizations, and the like provided by various processing systems, devices, members, or the like. Various interactions can enable members associated with an SNET infrastructure to access capabilities provided by an SNET group via a docked SNET group.
Abstract:
A social network (SNET) is divided into one or more circles having different trust levels. Communications between the different SNET circles is bridged by an SNET device capable of communicating with devices associated with the different SNET circles, even if those devices cannot communicate directly with each other. When a communication is sent between SNET circles, the SNET device verifies the trust level associated with the communication, and bridges the communication based, at least in part, on that trust level. The SNET device can be located in a demilitarized zone associated with both the first SNET circle and the second SNET circle. Where different SNET circles use different security secrets for communications between members, the SNET device can store different keys for each of those circles in separate, restricted portions of memory.
Abstract:
Members of a social network (SNET) circle can share content with other members of SNET circle, members of the same SNET that are not members of the same circle, or send content to people or devices outside of SNET. Trust chain can be used alone or in conjunction with other security measures to assign or select an appropriate level of content protection and SNET access. A trust rating or level associated with a trusted human member can be conferred to a social network device, allowing that device to be included in the trust chain. Trust can also be conferred from a trusted social network device to a child device of the social network device. A trust processing module can work in cooperation with one or more trust authorities to establish initial and updated overall trust levels of a human or device associated with the SNET.
Abstract:
A set top box or like device incorporating an untrusted software framework as a client of a secure operating system kernel. The software framework may comprise, for example, an Android framework supported by an underlying Linux operating system environment having a secure kernel. The software framework can be executed using a variety of process isolation techniques depending on performance and isolation requirements. A secure access client/server interface may also be provided to support interactions between the untrusted software framework (and applications utilizing the untrusted software framework) and secure or trusted portions of the device. The secure access interface can be configured to perform operations such as handle validation, heap pointer validation, non-pointer parameter validation, heap isolation, and resource release relating to terminated processes. In further embodiments, a software framework aggregator is used to support a plurality of additional software frameworks for use in the set top box.
Abstract:
A gateway having at least one communications interface and processing circuitry establishes communications with at least one service provider device and at least one serviced client device. The gateway then determines that a serviced client device is to establish an Internet browsing session. Based upon characteristics of the serviced client device, the gateway determines where to instantiate a web browser to service the Internet browsing session. Based upon the determination, in a first operation, instantiates the web browser to service the Internet browsing session at the gateway or client device. In a second operation, the gateway instantiates the web browser to service the Internet browsing session at a service provider server. In other operations, the gateway may determine to instantiate a browser for a first client device at a cloud server and to instantiate a browser for a second client device either locally or at the second client device.
Abstract:
An Ad Hoc social networking environment enables information and device access management between social networking groups and social networking members with or without access restrictions and anonymity. Contact and access information can be exchanged and updated on the fly without requiring users to notify other contacts or contacting devices and can support underlying contact information changes, enable extemporaneous termination or modification of contact access, enable temporary access, and the like. Ad Hoc social networking can utilize unique identifiers, proxy elements, or the like to support various levels of membership anonymity and Ad Hoc social networking. Proxy elements enable SNET tear down or dissolution by retracting the proxy service from a member. Storing social group contact information in shared databases can enable sharing and updating of contact information without the need to inform affected contacts. Some social networks can include various specialized devices and related services.
Abstract:
A gateway having at least one communications interface and processing circuitry establishes communications with at least one service provider device and at least one serviced client device. The gateway then determines that a serviced client device is to establish an Internet browsing session. Based upon characteristics of the serviced client device, the gateway determines where to instantiate a web browser to service the Internet browsing session. Based upon the determination, in a first operation, instantiates the web browser to service the Internet browsing session at the gateway or client device. In a second operation, the gateway instantiates the web browser to service the Internet browsing session at a service provider server. In other operations, the gateway may determine to instantiate a browser for a first client device at a cloud server and to instantiate a browser for a second client device either locally or at the second client device.