Abstract:
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.
Abstract:
A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a filter may route an encrypted content stream and associated information to a secure partition having a trusted computing component for decryption. Upon decryption, the trusted computing component may store the decrypted payload of the content in a secure storage location accessible to the trusted computing component. Thereafter, the decrypted navigational header information of the content may be used to navigate to the decrypted content via a trusted component such as a trusted rendering unit in the secure partition.
Abstract:
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.
Abstract:
A method, apparatus and system enabling software access to navigational data in a decrypted media stream while protecting stream payloads. In one embodiment, a filter may route an encrypted content stream and associated information to a secure partition having a trusted computing component for decryption. Upon decryption, the trusted computing component may store the decrypted payload of the content in a secure storage location accessible to the trusted computing component. Thereafter, the decrypted navigational header information of the content may be used to navigate to the decrypted content via a trusted component such as a trusted rendering unit in the secure partition.
Abstract:
Various embodiments are directed to cooperation among communications devices having microphones to employ their microphones in unison to provide voice detection with noise reduction for voice communications. A first communications device comprises a processor circuit; a first microphone; an interface operative to communicatively couple the processor circuit to a network; and a storage communicatively coupled to the processor circuit and arranged to store a sequence of instructions operative on the processor circuit to store a first detected data that represents sounds detected by the first microphone; receive a second detected data via the network that represents sounds detected by a second microphone of a second communications device; subtractively sum the first and second data to create a processed data; and transmit the processed data to a third communications device. Other embodiments are described and claimed herein.
Abstract:
Various embodiments are directed to cooperation among communications devices having microphones to employ their microphones in unison to provide voice detection with noise reduction for voice communications. A first communications device comprises a processor circuit; a first microphone; an interface operative to communicatively couple the processor circuit to a network; and a storage communicatively coupled to the processor circuit and arranged to store a sequence of instructions operative on the processor circuit to store a first detected data that represents sounds detected by the first microphone; receive a second detected data via the network that represents sounds detected by a second microphone of a second communications device; subtractively sum the first and second data to create a processed data; and transmit the processed data to a third communications device. Other embodiments are described and claimed herein.
Abstract:
Various embodiments are directed to cooperation among communications devices having microphones to employ their microphones in unison to provide voice detection with noise reduction for voice communications. A first communications device comprises a processor circuit; a first microphone; an interface operative to communicatively couple the processor circuit to a network; and a storage communicatively coupled to the processor circuit and arranged to store a sequence of instructions operative on the processor circuit to store a first detected data that represents sounds detected by the first microphone; receive a second detected data via the network that represents sounds detected by a second microphone of a second communications device; subtractively sum the first and second data to create a processed data; and transmit the processed data to a third communications device. Other embodiments are described and claimed herein.
Abstract:
Technologies for enabling biometric multi-factor authentication includes a transform selector value, a transform function that uses the transform selector value and a biometric user identifier as input, a salt derived from the output of the transform function, and a cryptographic hash function that generates a hash value based on the salt and a non-biometric user identifier.
Abstract:
Sensor data may be filtered in a secure environment. The filtering may limit distribution of the sensor data. Filtering may modify the sensor data, for example, to prevent identification of a person depicted in a captured image or to prevent acquiring a user's precise location. Filtering may also add or require other data use controls to access the data. Attestation that a filter policy is being applied and working properly or not may be provided as well.