Abstract:
Technologies for communicating with local components of a computing device include intercepting a name resolution request from a host application, resolving a hostname included in the name resolution request to obtain a network address assigned to a target destination of the network packet, and transmitting the network address to the host application in response to the name resolution request. Such technologies may also include receiving the network packet from the host application destined for the network address, determining whether the target destination of the network packet includes a local component of the computing device based on the network address, and transmitting the network packet to the local component of the computing device via a platform network in response to the network packet being destined for the local component of the computing device.
Abstract:
In an embodiment, an apparatus comprises a secure storage to store an entry having an identifier of a device to be paired with the apparatus and a master key shared between the apparatus and the device, and a connection logic to enable the apparatus to be securely connected to the device according to a connection protocol in which the device is authenticated based on the identifier received from the device and the master key. Other embodiments are described and claimed.
Abstract:
Technologies for 3D printing digital rights management (DRM) include a 3D printing device communicatively coupled with a 3D model storage server and a rights management server over a network. The 3D printing device may establish a model unlock engine in a first trusted execution environment and a key release engine in a second trusted execution environment. The model unlock engine may extract a content access policy and a content key from an encrypted 3D model and generate a content key request to the key release engine. The key release engine may validate the content key request and decrypt the content key in response to the content access policy being satisfied. The model unlock engine may further decrypt 3D model content included in the 3D model using the decrypted content key to facilitate the printing of the 3D model.
Abstract:
Described herein are architectures, platforms and methods for offloading process or application from a near field communication (NFC) master device for proxy delegation to a proxy NFC device.
Abstract:
Technologies for communicating with local components of a computing device include intercepting a name resolution request from a host application, resolving a hostname included in the name resolution request to obtain a network address assigned to a target destination of the network packet, and transmitting the network address to the host application in response to the name resolution request. Such technologies may also include receiving the network packet from the host application destined for the network address, determining whether the target destination of the network packet includes a local component of the computing device based on the network address, and transmitting the network packet to the local component of the computing device via a platform network in response to the network packet being destined for the local component of the computing device.
Abstract:
Techniques are disclosed that involve the indication of neighbor base stations. For instance, a base station may generate and wirelessly transmit a message that indicates a plurality of neighboring base stations. This message may include an indicator having one or more wildcard values. Through the employment of such wildcard values, the indicator may provide information corresponding to the plurality of neighboring base stations. For instance, the indicator may indicate a plurality of base station identifiers (BSIDs). Alternatively, the indicator may indicate a plurality of preamble indices. As a further alternative, the indicator may indicate a plurality of carrier frequencies. Through the employment of such techniques, overhead can be saved without causing ambiguity in mobility management.
Abstract:
In an embodiment, an apparatus comprises a secure storage to store an entry having an identifier of a device to be paired with the apparatus and a master key shared between the apparatus and the device, and a connection logic to enable the apparatus to be securely connected to the device according to a connection protocol in which the device is authenticated based on the identifier received from the device and the master key. Other embodiments are described and claimed.