摘要:
A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed.
摘要:
Private information can be collected from a receiving computing device user via a requesting computing device sharing selected content presented on a requesting device display with the receiving device. Communication between the devices can be secure, peer-to-peer and can be established using Near Field Communication technologies. The selected content comprises data fields for which a receiving device user supplies data values. The requesting computing device can update the presented selected content based on the received receiving user input and send updated display information to the receiving device. Alternatively, the receiving device can send data fields to the requesting device as data fields are fully entered. The selected content shared with and the data values received from the mobile device can be translated into other languages. Cloud resources can be involved in the pairing and authentication of devices, the translation of data sent between devices and the communication of data between devices.
摘要:
The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device.
摘要:
Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data.
摘要:
Various embodiments are generally directed to an apparatus, method and other techniques for detecting, by one or more sensor components, at least one sensor input, and executing, by logic, at least one instruction to cause an event on a wearable wireless device, the event comprising at least one of a change in a physical parameter on the wearable wireless device and a wireless communication with a computing device via a transceiver.
摘要:
In one example a controller comprises logic, at least partially including hardware logic, configured to detect a key phrase in a received audio signal, and in response to the key phrase, to transmit a signal to a personal assistant in a remote electronic device, determine whether an audio input was received, and in response to a determination that additional audio input was received prior to receiving a response from the personal assistant in the remote electronic device, to buffer the audio input in a memory and forward the audio input to the personal assistant in the remote electronic device. Other examples may be described.