摘要:
An approach for managing the privacy and disclosure of location information associated with a computer system. For one aspect, a request is received from a requestor for a location property associated with a location of a computer system. It is then determined whether a privacy preference associated with the requestor has been specified. If not, a user may be prompted to supply privacy preferences associated with the requester. The privacy preferences are then applied to determine whether or not to provide the requested information. A user setting, such as a basic input-output system memory location setting, may also be implemented to enable and/or disable location-aware computing.
摘要:
A problem-resolution software system is organized into a “solution cube” which interacts with a problem-resolution framework consisting of a production-system engine. The solution cube incorporates production-system rules, “solution interpreters” for implementing chosen solutions, and a common interface mechanism for standardizing the interaction between the solution interpreters and the production system. The solution cube may also incorporate “information providers” for obtaining information from specific information sources, and another common interface mechanism for standardizing the interaction between the information providers and the production system. Each solution cube, which is a uniquely identifiable problem-resolution object, is organized into sub-units of one or more “knowledge elements,” each of which may be reusable by other solution cubes. The knowledge elements operate to add semantic information to the CIM data model which defines the components of a computing environment in terms of objects. The knowledge elements, by using the production system rules to set restrictions and dependencies on the properties of CIM objects, specify the “preferred state” of a given computer system and performs necessary actions based on the rules to maintain the preferred state, which rules may request additional information for the purpose of clarifying the context of the initial CIM data model by using heuristics and reasoning. “Information providers,” each of which is a provider module that retrieves information from a specific information source, facilitate a streamlined channeling of information to the production system by sharing a common interface with the production system, thereby allowing implementation of a generalized query mechanism in the production system regardless of the actual physical implementation of the information source. In addition, “solution providers” are provided to interpret a requested solution, perform it, and notify the production system when the solution has completed, as well as notify the production system of any results. Because a common interface is used to request any one of the available solutions, the common interface allows developers to implement a generalized solution mechanism in the production system regardless of the actual physical implementation of the solution provider.
摘要:
Technologies for supporting and implementing multiple digital rights management protocols on a client device are described. In some embodiments, the technologies include a client device having an architectural enclave which may function to identify one of a plurality of digital rights management protocols for protecting digital information to be received from a content provider or a sensor. The architectural enclave select a preexisting secure information processing environment (SIPE) to process said digital information, if a preexisting SIPE supporting the DRM protocol is present on the client. If a preexisting SIPE supporting the DRM protocol is not present on the client, the architectural enclave may general a new SIPE that supports the DRM protocol on the client. Transmission of the digital information may then be directed to the selected preexisting SIPE or the new SIPE, as appropriate.
摘要:
Embodiments of an invention for measuring applications loaded in secure enclaves at runtime are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to extend a first measurement of a secure enclave with a second measurement. The execution unit is to execute the instruction after initialization of the secure enclave.
摘要:
Methods and apparatus for a secure sleep state are disclosed. An example method includes, in response to an initiation of a sleep state of a computing platform, encrypting a memory of the computing platform; and decrypting the memory when resuming the computing platform from the sleep state, wherein placing the computing platform in the sleep state includes powering down a portion of the computing platform and preserving a state of the computing platform.
摘要:
Methods and apparatus for a secure sleep state are disclosed. An example method includes, in response to an initiation of a sleep state of a computing platform, encrypting a memory of the computing platform; and decrypting the memory when resuming the computing platform from the sleep state, wherein placing the computing platform in the sleep state includes powering down a portion of the computing platform and preserving a state of the computing platform.