Abstract:
Methods, apparatuses and system provide for technology that interleaves a plurality of verification commands with a plurality of copy commands in a command buffer, wherein each copy command includes a message authentication code (MAC) derived from a master session key, wherein one or more of the plurality of verification commands corresponds to a copy command in the plurality of copy commands, and wherein a verification command at an end of the command buffer corresponds to contents of the command buffer. The technology may also add a MAC generation command to the command buffer, wherein the MAC generation command references an address of a compute result.
Abstract:
Technologies for control of an unmanned aerial vehicle (UAV) include a UAV including a computing device having a processor and a trusted execution environment (TEE). The TEE may be executed by a converged security and manageability engine (CSME) of the computing device. The TEE determines whether to take control of the UAV from an operating system, for example in response to a watchdog reset event. In response to taking control, the TEE controls navigation of the UAV and the operating system is booted. The TEE may control the UAV based on a navigation plan from the operating system or a default control policy. The operating system sends a message requesting control of the UAV in response to booting, and then resumes control of the UAV. The operating system may control navigation of the UAV based on abstracted sensor data received from the TEE. Other embodiments are described and claimed.
Abstract:
The present disclosure provides for MRC training. MRC training can include providing a hot add notification to a UEFI BIOS FW, receiving, at an MRC agent of the FIMC and from the UEFI BIOS FW, the MRC training request, and performing, at the MRC agent in response to the MRC training request, an MRC training independent of an SMM associated with the apparatus.
Abstract:
The Internet can be configured to provide communications to a large number of Internet-of-Things (IoT) devices. Devices can be designed to address the need for network layers, from central servers, through gateways, down to edge devices, to grow unhindered, to discover and make accessible connected resources, and to support the ability to hide and compartmentalize connected resources. Network protocols can be part of the fabric supporting human accessible services that operate regardless of location, time, or space. Innovations can include service delivery and associated infrastructure, such as hardware and software. Services may be provided in accordance with specified Quality of Service (QoS) terms. The use of IoT devices and networks can be included in a heterogeneous network of connectivity including wired and wireless technologies.
Abstract:
In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals. The service may provide recommendations on how to locate, reach, or avoid the target object or individual. Identifying and tracking an object may be used to locate an individual when the object is correlated with the individual. Individuals may register with the service for purposes of user authentication and for defining privacy authorizations for data related to the identifying the user and user's location to other parties. The service may execute in a trusted execution environment to help preserve privacy. Embodiments may be used for games, geo-caching, finding groups and individuals for meeting up, avoiding objects or individuals, etc. Other embodiments are described and claimed.
Abstract:
A system on a chip (SoC) may comprise at least one processor with at least one core and a storage device comprising a first system, virtual machine configured to be executed on the at least one processor. The storage device may comprise a second system virtual machine configured to he executed by the at least one processor. The second system virtual machine may include at least one process virtual, machine; a modem, configured as one of the at least one process virtual machine: and a real-time operating system (RTOS) to schedule execution of the at least one process virtual machine on the at least one processor.
Abstract:
A point-of-sale device ("POS") may include a secure transaction tunnel generator ("STG"). The STG may generate secure tunnels between peripherals attached to the POS and remote network resources. The secure tunnel may be generated using a trusted execution environment ("TEE") of the POS. The STG may be alerted to the need to generate the secure tunnel based on an alert from the peripheral. The STG may execute under a protected environment and generate two ends of a secure transaction tunnel using the TEE. The STG may also check the peripheral against whitelists and/or blacklists to determine whether the peripheral is allowed or not disallowed to participate in secure transactions. By generating the secure tunnel, the STG may facilitate performance of transactions in such a way that sensitive information is not available to unsecured processes in the POS. Other embodiments may be described and/or claimed.
Abstract:
Embodiments described herein relate generally to the transmission of a request for a file from a first computing device to a second computing device. The first computing device may present an image having a representation of a file to a user and detect a selection of a location on the image at which the representation of the file is disposed. The first computing device, in turn, may transmit the image and a description of the selection to the second computing device. Based on the received image and description of the selection, the second computing device may identify the file corresponding to the selected location on the image. The second computing device may adapt, or cause to be adapted, the identified file. The second computing device may then transmit the identified file (or the adapted version) to the first computing device. Other embodiments may be described and/or claimed.
Abstract:
Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated.
Abstract:
Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as "links") in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed.