摘要:
An architecture to perform resource management among multiple network nodes and associated resources is disclosed. Example resource management techniques include those relating to: proactive reservation of edge computing resources; deadline-driven resource allocation; speculative edge QoS pre-allocation; and automatic QoS migration across edge computing nodes. In a specific example, a technique for service migration includes: identifying a service operated with computing resources in an edge computing system, involving computing capabilities for a connected edge device with an identified service level; identifying a mobility condition for the service, based on a change in network connectivity with the connected edge device; and performing a migration of the service to another edge computing system based on the identified mobility condition, to enable the service to be continued at the second edge computing apparatus to provide computing capabilities for the connected edge device with the identified service level.
摘要:
Improved techniques for context information management are described. In one embodiment, for example, an apparatus may comprise a processor element, a selection component for execution by the processor element to select a context information item, a random number generator to generate a random number, and an anonymization component for execution by the processor element to generate a random key based on the random number and send a message associating the context information item with the random key. Other embodiments are described and claimed.
摘要:
Apparatus, systems, and/or methods to temporally and spatially bound personal information. A pseudo random number corresponding to time based on a random number time seed and generate a pseudo random number corresponding to location based on a random number location seed may be generated. In addition, the pseudo random number corresponding to time may be mixed with the pseudo random number corresponding to location to generate a combined pseudo random number corresponding to a specific user at a specific location at a specific time. The combined pseudo random number may be used to store and/or read personal information in an anonymous manner.
摘要:
Various embodiments are generally directed to techniques for monitoring the integrity of an operating system (OS) security routine that checks the integrity of an OS and/or one or more application routines. An apparatus may include a first processor component to execute an operating system (OS) in a first operating environment within a processing device and to execute an OS security routine to recurringly verify an integrity of the OS; a challenge component within a second operating environment within the processing device that is isolated from the first operating environment to recurringly challenge the OS security routine to provide a measure of itself; and a response component within the second operating environment to analyze each measure provided by the OS security routine and an elapsed time to receive each measure from the OS security routine to verify an integrity of the OS security routine.
摘要:
Various embodiments are generally directed to the provision re-provision of encryption keys to access encrypted media. Encryption keys may be provisioned and re-provisioned to components, such as, processor elements, of a system based on power state transitions of the components. An encryption key may be provisioned to a component and then re-provisioned to the component before or after the component transitions from an active power state to another power state and back to the active power state.
摘要:
Various embodiments are directed to techniques for controlling access to data in a decentralized manner. An apparatus includes an apportioning component to divide an item of data into multiple portions based on an organizational structure of the item of data; a tree component to generate a PRN tree including a multitude of nodes and a branching structure based on the organizational structure, the multitude including at least one branching node and multiple leaf nodes that correspond to the multiple portions; a PRN component to generate a PRN for each node of the multitude, the PRN component to use a PRN of a branching node of the PRN tree to generate a PRN for a leaf node that depends therefrom; and a communications component to transmit the multiple portions and multiple addresses based on PRNs of leaf nodes of the PRN tree to a server. Other embodiments are described and claimed.
摘要:
A protocol provides authentication of peripheral devices by a computing device to which the peripheral device connects. Computing devices include a verifier with a public key that authenticates multiple associated private keys. Private keys are embedded on peripheral devices. When the verifier is able to authenticate a connected peripheral, particular functionality is enabled that may not be enabled for peripherals that do not authenticate.
摘要:
Various embodiments are generally directed to use of a keyboard as a biometric authentication device. In one embodiment, for example, an apparatus comprises a processor circuit executing a sequence of instructions causing the processor circuit to receive a signal indicative of a keypress of at least one key of a keyboard communicatively coupled to the apparatus, and indicative of at least one physical characteristic associated with the keypress; compare the at least one physical characteristic to at least one stored physical characteristic associated with at least one authorized user of the apparatus; and determine if the keypress is associated with at least one authorized user of the apparatus based on the comparison. Other embodiments are described and claimed herein.
摘要:
In one embodiment, a method includes determining a location of a system responsive to location information received from at least one of a location sensor and a wireless device of the system, associating the location with a key present in the system to generate an authenticated location of the system, and determining whether the authenticated location is within a geofence boundary indicated in a location portion of a launch control policy (LCP) that provides a geographic-specific policy. Other embodiments are described and claimed.
摘要:
Devices and methods may provide for generating and/or using a trusted ephemeral identifier (TEID) to create a group for a service, and/or to provide the service. A verifier device may assign a value to a group that is to be created to provide the service, wherein the value may identify the group and may be issued to the prover device for use to generate the TEID value that is unique to the prover device and to participation of the prover device in the group. In addition, a prover device may generate the TEID value, wherein the TEID may be derived from a combination of a unique value that may be generated in a trusted execution environment (TEE) of the prover device and the value that may identify the group.