OBJECT IDENTIFICATION FOR IMPROVED UX USING IOT NETWORK

    公开(公告)号:WO2018125484A1

    公开(公告)日:2018-07-05

    申请号:PCT/US2017/063645

    申请日:2017-11-29

    Abstract: In some embodiments, the disclosed subject matter involves a system and method to identify objects in an environment or scene to assist in locating objects and individuals. In at least one embodiment, users register with a service to help locate and/or track objects and individuals. The service may provide recommendations on how to locate, reach, or avoid the target object or individual. Identifying and tracking an object may be used to locate an individual when the object is correlated with the individual. Individuals may register with the service for purposes of user authentication and for defining privacy authorizations for data related to the identifying the user and user's location to other parties. The service may execute in a trusted execution environment to help preserve privacy. Embodiments may be used for games, geo-caching, finding groups and individuals for meeting up, avoiding objects or individuals, etc. Other embodiments are described and claimed.

    EMBEDDED ARCHITECTURE BASED ON PROCESS VIRTUAL MACHINE
    6.
    发明申请
    EMBEDDED ARCHITECTURE BASED ON PROCESS VIRTUAL MACHINE 审中-公开
    基于过程虚拟机的嵌入式体系结构

    公开(公告)号:WO2017112266A1

    公开(公告)日:2017-06-29

    申请号:PCT/US2016/063379

    申请日:2016-11-22

    Abstract: A system on a chip (SoC) may comprise at least one processor with at least one core and a storage device comprising a first system, virtual machine configured to be executed on the at least one processor. The storage device may comprise a second system virtual machine configured to he executed by the at least one processor. The second system virtual machine may include at least one process virtual, machine; a modem, configured as one of the at least one process virtual machine: and a real-time operating system (RTOS) to schedule execution of the at least one process virtual machine on the at least one processor.

    Abstract translation: 片上系统(SoC)可以包括具有至少一个核心的至少一个处理器和包括第一系统的存储设备,所述第一系统被配置为在所述至少一个处理器上执行。 存储设备可以包括被配置为由至少一个处理器执行的第二系统虚拟机。 第二系统虚拟机可以包括至少一个过程虚拟机; 调制解调器,被配置为所述至少一个过程虚拟机中的一个:以及实时操作系统(RTOS),用于调度所述至少一个过程虚拟机在所述至少一个处理器上的执行。

    SECURE TRANSACTIONS WITH CONNECTED PERIPHERALS
    7.
    发明申请
    SECURE TRANSACTIONS WITH CONNECTED PERIPHERALS 审中-公开
    具有连接外围设备的安全交易

    公开(公告)号:WO2016153694A1

    公开(公告)日:2016-09-29

    申请号:PCT/US2016/019285

    申请日:2016-02-24

    Abstract: A point-of-sale device ("POS") may include a secure transaction tunnel generator ("STG"). The STG may generate secure tunnels between peripherals attached to the POS and remote network resources. The secure tunnel may be generated using a trusted execution environment ("TEE") of the POS. The STG may be alerted to the need to generate the secure tunnel based on an alert from the peripheral. The STG may execute under a protected environment and generate two ends of a secure transaction tunnel using the TEE. The STG may also check the peripheral against whitelists and/or blacklists to determine whether the peripheral is allowed or not disallowed to participate in secure transactions. By generating the secure tunnel, the STG may facilitate performance of transactions in such a way that sensitive information is not available to unsecured processes in the POS. Other embodiments may be described and/or claimed.

    Abstract translation: 销售点设备(“POS”)可以包括安全事务隧道发生器(“STG”)。 STG可以在连接到POS的外围设备和远程网络资源之间生成安全隧道。 可以使用POS的可信执行环境(“TEE”)生成安全隧道。 可以基于来自外围设备的警报,警告STG需要生成安全通道。 STG可以在受保护的环境下执行,并使用TEE生成安全事务隧道的两端。 STG还可以检查外设是否有白名单和/或黑名单,以确定外设是否被允许或不允许参与安全事务。 通过生成安全隧道,STG可以以敏感信息不可用于POS中的不安全进程的方式促进事务的执行。 可以描述和/或要求保护其他实施例。

    MECHANISM FOR FILE TRANSFORMATION AND SHARING ACROSS DEVICES USING CAMERA INTERFACE
    8.
    发明申请
    MECHANISM FOR FILE TRANSFORMATION AND SHARING ACROSS DEVICES USING CAMERA INTERFACE 审中-公开
    用于文件转换和使用摄像机界面的设备共享的机制

    公开(公告)号:WO2015199823A1

    公开(公告)日:2015-12-30

    申请号:PCT/US2015/029978

    申请日:2015-05-08

    Abstract: Embodiments described herein relate generally to the transmission of a request for a file from a first computing device to a second computing device. The first computing device may present an image having a representation of a file to a user and detect a selection of a location on the image at which the representation of the file is disposed. The first computing device, in turn, may transmit the image and a description of the selection to the second computing device. Based on the received image and description of the selection, the second computing device may identify the file corresponding to the selected location on the image. The second computing device may adapt, or cause to be adapted, the identified file. The second computing device may then transmit the identified file (or the adapted version) to the first computing device. Other embodiments may be described and/or claimed.

    Abstract translation: 本文所描述的实施例一般涉及将文件从第一计算设备传送到第二计算设备。 第一计算设备可以将具有文件表示的图像呈现给用户,并且检测对图像上的文件的表示进行设置的位置的选择。 第一计算设备又可以将图像和选择的描述传送到第二计算设备。 基于所接收的图像和选择的描述,第二计算设备可以识别与图像上的所选位置相对应的文件。 第二计算设备可以适应或引起适配识别的文件。 然后,第二计算设备可以将所识别的文件(或适配版本)发送到第一计算设备。 可以描述和/或要求保护其他实施例。

    MECHANISMS FOR LOCKING COMPUTING DEVICES
    9.
    发明申请
    MECHANISMS FOR LOCKING COMPUTING DEVICES 审中-公开
    用于锁定计算设备的机构

    公开(公告)号:WO2014142960A1

    公开(公告)日:2014-09-18

    申请号:PCT/US2013/032031

    申请日:2013-03-15

    Abstract: Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated.

    Abstract translation: 这里描述了用于锁定计算设备的各种系统和方法。 在一个示例中,便携式设备包括机电锁; 以及耦合到所述机电锁的固件模块,所述固件模块被配置为:接收解锁码; 验证解锁码; 并且当解锁码被验证时解锁机电锁。 在另一示例中,用于管理BIOS验证的设备,所述设备包括NFC模块,所述NFC模块包括NFC天线; 固件模块,其中所述固件模块被配置为:经由所述NFC天线从NFC设备接收解锁码; 验证解锁码; 并在验证解锁码时解锁设备的BIOS。

Patent Agency Ranking