Patent application number | Description | Published |
20100169630 | Pre-boot Recovery of a Locked Computer System - Embodiments of the present disclosure provide methods, apparatuses, articles, and removable storage devices for pre-boot recovery of a locked computer system. Other embodiments may also be described and claimed. | 07-01-2010 |
20110076986 | THEFT DETERRENT TECHNIQUES AND SECURE MOBILE PLATFORM SUBSCRITION FOR WIRELESSLY ENABLED MOBILE DEVICES - Theft deterrence and secure mobile platform subscription techniques for wireless mobile devices are described. An apparatus may comprise a removable secure execution module arranged to connect with a computing platform for a wireless mobile device. The removable secure execution module may comprise a first processing system to execute a security control module. The security control module may be operative to communicate with a security server over a wireless channel on a periodic basis to obtain a security status for the wireless mobile device. The security control module may output control directives to control operations for one or more components of the computing platform based on the security status. Other embodiments are described and claimed. | 03-31-2011 |
20110078791 | Using chipset-based protected firmware for host software tamper detection and protection - A method, system, and computer program product for a host software tamper detection and protection service. A secure partition that is isolated from a host operating system of the host system, which may be implemented by firmware of a chipset of the host system, obtains file metadata from the host system and uses the file metadata to identify a first file for examination for tampering. The secure partition obtains data blocks for the first file, communicates with a service via an out-of-band communication channel, and uses information obtained from the service and the data blocks to determine whether the first file has been corrupted. The secure partition obtains the file metadata and the data blocks for the first file without invoking an operating system or file system of the host system. | 03-31-2011 |
20110125485 | METHODS AND SYSTEMS FOR REAL TIME LANGUAGE TRANSLATION USING SOCIAL NETWORKING - Methods and systems with which a language translation may be obtained. An originator may request a translation by sending the passage to be translated to a server. The server may then broadcast the passage to prospective translators. In an embodiment, the translators may be connected to the originator and/or each other through a social network. Some or all of the prospective translators then return translations of the passage to the originator, via the server. The originator may then select the most desirable translation and inform the server. In an embodiment, the provision of the translation service may be part of an exchange or barter transaction. The server may apply a credit to the translator of the chosen translation. The translator may then use the credit in a subsequent trade or other transaction. | 05-26-2011 |
20110129077 | METHODS AND SYSTEMS FOR REAL TIME DISPLAY OF CALLER LOCATION, PROFILE, AND TRUST RELATIONSHIP - Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party. | 06-02-2011 |
20110131447 | Automated modular and secure boot firmware update - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 06-02-2011 |
20110151836 | Secure subscriber identity module service - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 06-23-2011 |
20110151854 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - A method and device for remote management over a wireless wide-area network includes receiving a short message over a wireless wide-area network (WWAN) using an out-of-band (OOB) processor of a computing device. The OOB processor is capable of communicating over the WWAN irrespective of an operational state of an in-band processor of the computing device. The computing device executes at least one operation with the OOB processor in response to receiving the short message. | 06-23-2011 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 06-23-2011 |
20110154502 | Data Protection - A method to manage data access in an electronic device comprising a housing having a lid comprises receiving, from a remote server, a data protection policy, storing the data protection policy in a memory location on the electronic device, detecting a transition from a lid open status to a lid closed status, and in response to the transition, implementing the data protection policy on the electronic device. Other embodiments may be described. | 06-23-2011 |
20110161145 | METHOD AND DEVICE FOR SECURELY DISPLAYING DIGITAL CONTENT ON A COMPUTING DEVICE - A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device. | 06-30-2011 |
20110237221 | METHOD AND APPARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY THE SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed. | 09-29-2011 |
20110238970 | System and method to lock electronic device - A method to lock an electronic device comprising an operating system comprises placing the electronic device in a disable state in which the processor is blocked from accessing the operating system, receiving a first unlock password from a remote source during a power-up operation of the electronic device, and placing the electronic device in a temporary unlock state which allows the processor to boot the operating system for a predetermined period of time when the first unlock password matches a password stored in the electronic device. Other embodiments may be described. | 09-29-2011 |
20110246373 | PAYMENT MANAGEMENT ON MOBILE DEVICES - Embodiments of techniques and systems for asynchronous offline bill review and payment are described. A bill payment management module, operated on a manageability engine on a mobile device, communicates with an online bill payment service. The bill payment management module may receive information about bill payments, including bills which are due, and presents selective information to a bill payment client application. A bill payer can then access the information on the mobile device through the bill payment client application and review or change the payment amounts. The review and the modifications may be performed when the mobile device is offline and the modifications may be stored until a later time when the mobile device can connect to a network. Once a network is available, the bill payment management module may send payment instructions to the online bill payment service. Other embodiments may be described and claimed. | 10-06-2011 |
20110246757 | UNATTENDED SECURE REMOTE PC CLIENT WAKE, BOOT AND REMOTE LOGIN USING SMART PHONE - Methods and systems to allow an authorized user to remotely awaken, boot, and login to a computer in a secure manner. The user and computer may communicate using a short message service. (SMS). The user may communicate with the computer using a mobile device, such as a smart phone. The user may initially provide a wake-up message to the computer, which may then respond by asking for one or more boot passwords. In an embodiment, these boot passwords may be basic input/output system (BIOS) passwords that are required for the loading and operations of the computer's BIOS. The user may then provide these one or more passwords to the computer. The computer may further request an operating system (OS) login password. The user may then provide this password to the computer. In an embodiment, all passwords may be provided to the computer in encrypted form. Moreover, authentication measures may be used to provide assurance that the user is legitimate. | 10-06-2011 |
20120030110 | DEVICE, SYSTEM, AND METHOD FOR LOCATION-BASED PAYMENT AUTHORIZATION - A device, system, and method for location-based payment authorization includes receiving a payment request for an order submitted from a mobile computing device via an e-commerce vendor website. A location of the mobile computing device is determined based on location data. In one embodiment, the payment request is authorized or denied based on whether the e-commerce vendor website has been authorized for the determined location of the mobile computing device. | 02-02-2012 |
20120115442 | SECURE SUBSCRIBER IDENTITY MODULE SERVICE - A method, apparatus, system, and computer program product for a secure subscriber identity module service. Communication via a mobile network is activated in response to receiving a request to activate communication service for the system by a secure partition of the system. In response to receiving the request, a key is retrieved for a permit service from storage accessible only by the secure partition. The key is included in a permit requesting to activate the communication service, and the permit is sent to a service provider for the communication service. The service provider communicates with the permit service to obtain a digital signature for the permit. The secure partition receives a signed permit from the service provider, confirms that the signed permit contains the digital signature by the permit service, and activates the communication service for the system in response to confirming that the signed permit contains the digital signature. | 05-10-2012 |
20120131345 | SECURE SOFTWARE LICENSING AND PROVISIONING USING HARDWARE BASED SECURITY ENGINE - Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key. | 05-24-2012 |
20120166304 | REAL-TIME MOBILE PAYMENT PROCESSING SYSTEM - A method, system, and device are disclosed. In one embodiment the method includes receiving a recipient phone number into an electronic gift phone module (EGPM). The EGPM also receives a set of gift data that includes a gift identification. The EGPM sends the recipient phone number and at least some gift data to an electronic gift processing server module (EGPSM). The EGPSM purchases a recipient gift by utilizing the gift identification. The EGPSM also sends notification of the recipient gift purchase to the recipient phone number. | 06-28-2012 |
20120178481 | REMOTE MANAGEMENT OVER A WIRELESS WIDE-AREA NETWORK USING SHORT MESSAGE SERVICE - Illustrative embodiments of systems and methods providing remote management over a wireless wide-area network (WWAN) using short messages are disclosed. In one embodiment, a computing device may include an in-band processor, a wireless transceiver configured for communications over a WWAN, and an out-of-band (OOB) processor capable of communicating over the WWAN using the wireless transceiver irrespective of an operational state of the in-band processor. The OOB processor may be configured to receive a short message via the wireless transceiver, determine whether the short message originated from a trusted remote computing device, and execute at least one operation indicated by the short message in response to determining that the short message originated from a trusted remote computing device. | 07-12-2012 |
20130003502 | CONFIGURABLE ULTRASOUND MEASUREMENT LOGIC IN A MOBILE COMPUTING DEVICE - A device, system, method, and machine readable medium for configurable ultrasound Doppler measurements from a mobile device are disclosed. In one embodiment, the device includes an oscillator capable of generating an ultrasound frequency sound wave. The device also includes an ultrasound emission module capable of emitting a first ultrasound wave at a first frequency and at a first power level and a second ultrasound wave at a second frequency and at a second power level. The device also an ultrasound receiver and amplifier module capable of receiving and amplifying ultrasound emission waves. The device also includes processing logic capable of receiving the first and second ultrasound waves and displaying those waves on a display device. | 01-03-2013 |
20130007873 | SYSTEMS AND METHODS FOR POWER-ON USER AUTHENTICATION - Embodiments of systems and methods for power-on user authentication are disclosed. A method for power-on user authentication may comprise receiving an authentication input with a security controller of a computing device prior to supplying power to a primary processor of the computing device, comparing the authentication input to an authentication code using the security controller, and supplying power to the primary processor in response to the authentication input matching the authentication code. | 01-03-2013 |
20130283182 | MECHANISM FOR FACILITATING PROXY USER INTERFACE-BASED REMOTE MANAGEMENT AND CONTROL OF COMPUTING AND NON-COMPUTING DEVICES - A mechanism is described for facilitating proxy user interface-based remote management and control of computing devices according to one embodiment of the invention. A method of embodiments of the invention includes remotely pairing a first device with a second device, and remotely controlling the second device via a user interface provided at the first device. The user interface may serve as a proxy user interface at the first device for remotely controlling the second device. The first device may include a first computing device, and wherein the second device may include a second computing device or a second non-computing device. | 10-24-2013 |
20130322648 | MULTI-STREAM-MULTIPOINT-JACK AUDIO STREAMING - A method and device for streaming the output of one or more audio sources to one or more smart headsets includes establishing a secure connection with a smart headset, associating an audio channel of the one or more audio sources with the smart headset, and streaming the associated audio channel to the smart headset. The audio streaming device may selectively stream one or more audio channels from one or more audio sources to one or more of the smart headsets as a function of a streaming policy. | 12-05-2013 |
20140013136 | POWER EFFICIENT LOCATION NOTIFICATION - Before a device enters a power saving mode, a location-aware application in the device may provide at least one wake trigger (and a trigger limit) to a low power monitoring module (LPMM). In power saving mode, the LPMM receives device locations from a location service module and may determine when the device location corresponds to the at least one wake trigger or trigger limit. In one embodiment, device location may only be provided to the LPMM based on a condition (e.g., timer expiration or reaching a displacement threshold as measured by sensors in the device). When device location corresponds to the trigger limit, the LPMM may notify the device (e.g., cause a transition to an active power mode) so that the location-aware application can redetermine the at least one wake trigger. The device location corresponding to the at least wake trigger may also cause the LPMM to notify the device. | 01-09-2014 |
20140015987 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 01-16-2014 |
20140047428 | AUTOMATED MODULAR AND SECURE BOOT FIRMWARE UPDATE - A method, apparatus, system, and computer program product for an automated modular and secure boot firmware update. An updated boot firmware code module is received in a secure partition of a system, the updated boot firmware code module to replace one original boot firmware code module for the system. Only the one original boot firmware code module is automatically replaced with the updated boot firmware code module. The updated boot firmware code module is automatically executed with the plurality of boot firmware code modules for the system and without user intervention when the system is next booted. The updated boot firmware code module may be written to an update partition of a firmware volume, wherein the update partition of the firmware volume is read along with another partition of the firmware volume containing the plurality of boot firmware code modules when the system is booted. | 02-13-2014 |
20140075496 | MOBILE PLATFORM WITH SENSOR DATA SECURITY - Generally, this disclosure describes devices, methods and systems for securely providing context sensor data to mobile platform applications. The method may include configuring sensors to provide context data, the context data associated with a mobile device; providing an application programming interface (API) to a sensor driver, the sensor driver configured to control the sensors; providing a trusted execution environment (TEE) operating on the mobile device, the TEE configured to host the sensor driver and restrict control and data access to the sensor driver and to the sensors; generating a request for the context data through the API, the request generated by an application associated with the mobile device; receiving, by the application, the requested context data and a validity indicator through the API; verifying, by the application, the requested context data based on the validity indicator; and adjusting a policy associated with the application based on the verified context data. | 03-13-2014 |
20140075550 | HARDWARE-ENFORCED ACCESS PROTECTION - The present disclosure is directed to systems and methods related to hardware-enforced access protection. An example device may comprise a login agent module (LAM), an operating system login authentication module (OSLAM) and a secure user authentication module (SUAM). The LAM may be configured to cause a prompt requesting login information to be presented by the device. The LAM may then provide the login information to the OSLAM, which may be configured to authenticate the login information using known user information. If authenticated, the OSLAM may generate and transmit a signed login success message to the SUAM using a private key. The SUAM may be secure/trusted software loaded by device firmware, and may be configured to authenticate the signed login success message. If authenticated, the SUAM may transmit an encrypted authentication message to the OSLAM. If the encrypted authentication message is authenticated, the OSLAM may grant access to the device. | 03-13-2014 |
20140089507 | APPLICATION INDEPENDENT CONTENT CONTROL - Systems and techniques for application independent content control are described herein. It may be determined that a content filter is enabled for a computing device. The content filter may include a restricted term. A content container may be identified in a device buffer of the computing device. The content container may also include the restricted term. A portion of the content container corresponding to the restricted term may be modified in the device buffer to block the restricted term. | 03-27-2014 |
20140093083 | SYSTEM, DEVICE, AND METHOD FOR SECURING VOICE AUTHENTICATION AND END-TO-END SPEECH INTERACTION - A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the client device. The client device decrypts the encrypted audio prompt and stores the decrypted audio prompt in secure memory inaccessible to the operating system using an audio engine of the client device. The audio engine then retrieves the audio and renders it for the user through the speakers of the client device. The client device captures the user's audio response with a microphone and stores the audio response in the secure memory. The stored audio response is encrypted and transmitted to the server. | 04-03-2014 |
20140094989 | MECHANISM FOR FACILITATING REAL-TIME CONTEXT-AWARE MESSAGES FOR VEHICLE-BASED AND OTHER COMPUTING DEVICES - A mechanism is described for facilitating real-time context-aware messages at computing devices according to one embodiment. A method of embodiments, as described herein, includes evaluating real-time context-aware data relating to a vehicle, recommending a real-time message based the evaluation of the context-aware data. The recommended message may include one or more of a warning message, an alert message, a reminder message, and an information message. The method may further include facilitating displaying the recommended real-time message at a first display screen at the vehicle or a second display screen of a mobile computing device within a proximity of the vehicle. Other embodiments are described and claimed. | 04-03-2014 |
20140169634 | SYSTEM, DEVICE, AND METHOD FOR DETECTING AND LOCATING WANTED VEHICLES - A method, system, and device for analyzing images captured by a vehicle-based camera includes establishing a communication connection between a mobile communication device and an in-vehicle computing system. Scanning data may be retrieved from a scanning data server by the mobile communication device and, in some embodiments, forwarded to the in-vehicle computing system. A vehicle-base camera may be used to capture one or more images. An image analysis module of the in-vehicle computing system or mobile communication device may be used to analyze the captured image(s) for a match between the image(s) and the scanning data. In response to identifying a match, the mobile communication device may notify the scanning data server of the identified match. | 06-19-2014 |
20140173271 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 06-19-2014 |
20140181691 | SHARING OF SELECTED CONTENT FOR DATA COLLECTION - Private information can be collected from a receiving computing device user via a requesting computing device sharing selected content presented on a requesting device display with the receiving device. Communication between the devices can be secure, peer-to-peer and can be established using Near Field Communication technologies. The selected content comprises data fields for which a receiving device user supplies data values. The requesting computing device can update the presented selected content based on the received receiving user input and send updated display information to the receiving device. Alternatively, the receiving device can send data fields to the requesting device as data fields are fully entered. The selected content shared with and the data values received from the mobile device can be translated into other languages. Cloud resources can be involved in the pairing and authentication of devices, the translation of data sent between devices and the communication of data between devices. | 06-26-2014 |
20140189017 | COMPREHENSIVE TASK MANAGEMENT - Technologies for generating tasks from communication messages includes a mobile computing device for monitoring communication messages, parsing the communication messages to detect content indicative of upcoming tasks, generating a task for each of the upcoming tasks detected, generating a task list from the generated tasks, and generating an alarm for each task. Additionally, the mobile computing device receives tasks generated by a cloud server. | 07-03-2014 |
20140189392 | COMMUNICATION LINK AND NETWORK CONNECTIVITY MANAGEMENT IN LOW POWER MODE - Methods and apparatus relating to communication link and network connectivity management in low power mode are described. In one embodiment, logic manages one or more external communication network links (also referred as “links”) in response to a determination that a processor has entered a low power consumption state and based on policy information. The logic also blocks/intercepts one or more signals, corresponding to management of the one or more links, that are directed to the processor to allow the processor to stay in the low power consumption. Other embodiments are also claimed and disclosed. | 07-03-2014 |
20140208340 | DYNAMIC CONTENT RATING MANAGEMENT ACROSS A VARIETY OF TELEVISION INPUT SOURCES - Generally, this disclosure describes a system and method for dynamic content management across a variety of television input sources. The system may include an audience detection module configured to identify a viewer in a viewing area of a display configured to display received media content; a media scanning module configured to determine a media content rating associated with a portion of a media content received from at least one of a local content source and a remote content source; and a media player configured to adapt display of the portion of the received media content based on a policy when the associated media content rating corresponds to inappropriate content for the identified viewer. | 07-24-2014 |
20140212051 | METHOD AND APPARATUS FOR CONTROLLING CONTENT CAPTURE OF PROHIBITED CONTENT - Embodiments of methods, apparatuses, and storage mediums associated with controlling content capture of prohibited content on remote devices, are disclosed. In embodiments, components of a remote device may receive image data of an image captured by the remote device and analyze the image data to determine whether the image includes prohibited content. In embodiments, the remote device may conditionally display or persistently store the image data, based at least in part on a result of the analysis. | 07-31-2014 |
20140283018 | MECHANISMS FOR LOCKING COMPUTING DEVICES - Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NFC module, the NFC module comprising an NFC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NFC device via the NFC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated. | 09-18-2014 |
20140289789 | CLOUD BASED REAL TIME APP PRIVACY DASHBOARD - A method of operating an electronic device comprises detecting access to private information stored in memory of the electronic device. The detecting is performed by a privacy management module downloadable to the electronic device as object code for execution on the electronic device and the access is performed by a client application program. The method further comprises tracking, using the privacy management module, the private information being accessed by the client application program, and reconfiguring the electronic device, using the privacy management module, to change the access to the private information by the client application program according to at least one privacy access policy stored in the electronic device. | 09-25-2014 |
20140308924 | METHOD AND APARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using near field communication, Bluetooth, direct connect to a PC, or by other secure, local wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic. Other embodiments are described and claimed. | 10-16-2014 |
20140362236 | CONTEXT BASED MANAGEMENT FOR SECURE AUGMENTED REALITY APPLICATIONS - An example system that allows a camera enabled application, such as an augmented reality application, to run in a protected area may include a first device including a camera, the camera including a secure mode of operation and a display, an image processing module configured to convert image data from the camera to encoded data when the camera is in the secure mode and protect image data stored in the system, an encryption module configured to encrypt encoded data from the image processing module, and a protected audiovisual path mechanism configured to securely send augmented encoded data to the display. | 12-11-2014 |
20150046698 | POWER LINE BASED THEFT PROTECTION OF ELECTRONIC DEVICES - Technologies for establishing and managing a connection with a power line communication network include establishing a communication connection between an electronic device and a security server. A default device encryption key associated with the electronic device is changed to correspond with a new device encryption key of the security server. Thereafter, the electronic device may only join a power line communication network of a particular security server using a network membership key, which is encrypted with the device encryption key that the particular security server associates to the electronic device. The electronic device contains a circuit interrupt to interrupt a circuit of the electronic device if the electronic device is not able to successfully decrypt the network membership key. | 02-12-2015 |
20150065199 | MOBILE PHONE WITH VARIABLE ENERGY CONSUMING SPEECH RECOGNITION MODULE - Apparatus, computer-readable storage medium, and method associated with speech recognition are described. In embodiments, a mobile phone may include a processor; and a speech recognition module coupled with the processor. The voice recognition module may be configured to recognize one or more voice commands and may include first echo cancellation logic and second echo cancellation logic to be selectively employed during recognition of voice commands. Employment of the first and second echo cancellation logic respectively may cause the mobile phone to variably consume a first and second amount of energy, with the second amount of energy being less than the first amount energy. | 03-05-2015 |
20150070184 | LOW POWER VOICE TRIGGER FOR FINDING MOBILE DEVICES - Systems and methods may provide for monitoring an input audio signal from an onboard microphone of a mobile device while a host processor of the mobile device is in a standby mode. Additionally, a predetermined audio pattern may be identified in the input audio signal and a device location session may be triggered with respect to the mobile device based on the predetermined audio pattern. In one example, an output audio signal is generated during the device location session. | 03-12-2015 |