摘要:
Systems and methods for sharing an e-wallet are disclosed. In some embodiments, the systems and methods may share an e-wallet among multiple users on a single device. In other embodiments, the systems and method may share an e-wallet among multiple devices and/or multiple users on multiple devices. In some instances, an remotely stored e-wallet may be used or leveraged by an e-wallet uncertified device.
摘要:
Systems and methods for sharing an e-wallet are disclosed. In some embodiments, the systems and methods may share an e-wallet among multiple users on a single device. In other embodiments, the systems and method may share an e-wallet among multiple devices and/or multiple users on multiple devices. In some instances, an remotely stored e-wallet may be used or leveraged by an e-wallet uncertified device.
摘要:
Technologies for verifying hardware components of a computing device include retrieving platform identification data of the computing device, wherein the platform identification data is indicative of one or more reference hardware components of the computing device, accessing hardware component identification data from one or more dual-headed identification devices of the computing device, and comparing the platform identification data to the hardware component identification data to determine whether a hardware component of the computing device has been modified. Each of the one or more dual-headed identification devices is secured to a corresponding hardware component of the computing device, includes identification data indicative of an identity of the corresponding hardware component of the computing device, and is capable of wired and wireless communication.
摘要:
A method and system provides the user of a computing device with information, analysis, suggestions and/or recommendations relating to the user's financial information and/or purchasing history, in relation to an electronic commerce transaction initiated by the user at the computing device, prior to, during, or after completion of the electronic commerce transaction.
摘要:
Generally, this disclosure describes providing theft deterrence for a device while in transit. The system may include lock state circuitry configured to receive and store an unlock token, the unlock token configured to indicate that an associated device has successfully completed transit from a source to a destination; and lock state read circuitry configured to request the unlock token from the lock state circuitry and to determine whether the associated device has successfully completed transit from the source to the destination based on the unlock token.
摘要:
Generally, this disclosure describes providing theft deterrence for a device while in transit. The system may include lock state circuitry configured to receive and store an unlock token, the unlock token configured to indicate that an associated device has successfully completed transit from a source to a destination; and lock state read circuitry configured to request the unlock token from the lock state circuitry and to determine whether the associated device has successfully completed transit from the source to the destination based on the unlock token.
摘要:
A method and system provides the user of a computing device with information, analysis, suggestions and/or recommendations relating to the user's financial information and/or purchasing history, in relation to an electronic commerce transaction initiated by the user at the computing device, prior to, during, or after completion of the electronic commerce transaction.
摘要:
Described herein are an apparatus, system, and method for attribute identity control in a processor. The apparatus comprises a logic unit including a radio-frequency identification (RFID) tag comprising a non-volatile memory; and a processor operable to access the non-volatile memory, wherein the non-volatile memory for storing an attribute identity associated with a group of processors, the attribute identity being different from an identity of the processor.
摘要:
Embodiments of the invention are directed towards logic and/or modules stored in processor secure storage to determine whether a first platform firmware image (e.g., basic input/output system (BIOS), device read-only memory (ROM), manageability engine firmware) loaded onto a processor cache is valid. The processor executes the first platform firmware image if it is determined to be valid. If the first platform image is determined to be invalid, a second platform firmware image is located. If this platform firmware image is determined to be valid, the processor will execute said second platform image.In some embodiments of the invention, the determination of whether the first platform firmware image is valid is based, at least in part, on verification of a digital signature associated with the first platform firmware image. The digital signature may be created, for example, from a private key, wherein the digital signature is verified via a public key.
摘要:
In one embodiment, the present invention includes a method for determining if a system is compatible with an upgrade to a hardware resource of the system, receiving instructions from a remote server to upgrade the hardware resource if the system is compatible, and programming the hardware resource based on the instructions. In one such embodiment, the hardware resource may be programmed via programmable fuses to enable circuitry of the hardware resource. Other embodiments are described and claimed.