Patent application number | Description | Published |
20090249095 | User driven power conservation in processor-based systems - A processor-based system may receive user inputs to determine how to achieve power conservation needs or preferences of the user. The user may supply inputs in terms of preferences and how power conservation might be achieved. In addition, the user may provide needs or goals for the system in terms of operating life while under battery power. The system may then develop a plan to achieve those needs and preferences and, in some embodiments, may offer that plan up to the user for approval. | 10-01-2009 |
20110161145 | METHOD AND DEVICE FOR SECURELY DISPLAYING DIGITAL CONTENT ON A COMPUTING DEVICE - A method and device for securely displaying digital content, such as an advertisement, on a computing device includes establishing an advertisement enforcement module in a secured environment on the computing device. The computing device receives advertisements from a remote advertisement server, which are validated by the advertisement enforcement module. The advertisement enforcement module ensures that the advertisement is displayed on the computing device in a secure manner and monitors for tampering of the advertisement and advertisement service by the user of the device. | 06-30-2011 |
20110161452 | COLLABORATIVE MALWARE DETECTION AND PREVENTION ON MOBILE DEVICES - The present disclosure describes a method and apparatus for collaborative threat detection on mobile devices. A mobile device may comprise a processor, secure memory, and secure circuitry. The processor may be coupled to host memory and may be configured to execute a security threat detection application to detect a malicious program attacking the mobile device. The secure memory may be configured to host a collaborator database comprising data corresponding to at least one collaborating device. The secure circuitry may be configured to determine if the security threat detection application running on the processor is properly operating. If an abnormality in the operation of the security threat detection application is detected, the secure circuitry may be further configured to cause a security threat notification to be transmitted to the collaborating device based on the data in the collaborator database. | 06-30-2011 |
20110161667 | TRUSTED GRAPHICS RENDERING FOR SAFER BROWSING ON MOBILE DEVICES - The present disclosure describes a method and apparatus for determining a safety level of a requested uniform resource locator (URL) on a mobile device. Secure memory may be configured to host at least one database comprising a plurality of uniform resource locators (URLs) and to also host information representing at least one logo indicative of a safety level of the URLs in the database. Secure circuitry may be configured to compare a requested URL with the database to determine if the requested URL corresponds to one of the URLs of the database and to select an appropriate logo stored in the secure memory. The secure circuitry may be further configured to direct overlay circuitry to blend the appropriate logo onto rendered data from a frame buffer video memory for display to a user. | 06-30-2011 |
20110237221 | METHOD AND APPARATUS FOR BEARER AND SERVER INDEPENDENT PARENTAL CONTROL ON SMARTPHONE, MANAGED BY THE SMARTPHONE - In some embodiments, the invention involves parental or master control of a child or subordinate mobile phone without service provider intervention. An embodiment of the invention is a system and method relating to master control of the subordinate smart phone using features on the smart phones, and independent of features provided by the phone service providers. Communication between the master and subordinate phones may be initiated using SMS messaging, near field communication, Bluetooth, direct connect to a PC, or by other secure wireless or wired connections. Once initiated, desired communication events are captured by the parental control application to effect control policies on the subordinate phone. Communication between the phones may be encrypted to prevent malicious intervention of message traffic Other embodiments are described and claimed. | 09-29-2011 |
20110249022 | TECHNIQUES FOR MANAGING POWER USE - Techniques are described that can be used to manage drawing requests from applications based in part on whether the drawing requests can be displayed and in part on the power consumption states of hardware in the system. If the drawing request can not be displayed, then a number of responses can take place. For example, instead of providing the drawing request to hardware and the driver provides a zero pixel region to the hardware. In some cases, the driver saves the state changes that would have resulted had the drawing request been performed and the drawing request is rendered to a buffer instead of the hardware being powered-on. Other examples are described herein. | 10-13-2011 |
20120131345 | SECURE SOFTWARE LICENSING AND PROVISIONING USING HARDWARE BASED SECURITY ENGINE - Provisioning a license and an application program from a first server to a computing platform over a network. The host application derives a symmetric key at least in part from a user password, and sends the license to a license management firmware component of a security engine, in a message signed by the symmetric key. The license management firmware component derives the symmetric key at least in part from the user password stored in a secure storage of the security engine, verifies the signature on the message using the symmetric key, verifies the first server's signature on the license, decrypts the license using a first private key of the license management firmware component corresponding to the first public key to obtain the second key, and sends the second key to the host application, which decrypts the application program using the second key. | 05-24-2012 |
20120167188 | USER IDENTITY ATTESTATION IN MOBILE COMMERCE - A method, apparatus, system, and computer program product for user identity attestation in mobile commerce. The method may include obtaining a photograph of a user of a mobile device via a camera integrated with the mobile device; identifying a first set of fiducial points from the photograph; causing the first set of fiducial points from the photograph to be compared to a second set of fiducial points associated with an authorized user of the mobile device; and determining that the user is the authorized user if the first set of fiducial points matches the second set of fiducial points. | 06-28-2012 |
20120167218 | SIGNATURE-INDEPENDENT, SYSTEM BEHAVIOR-BASED MALWARE DETECTION - A method, system, and computer program product for detecting malware based upon system behavior. At least one process expected to be active is identified for a current mode of operation of a processing system comprising one or more resources. An expected activity level of the one or more resources of the processing system is calculated based upon the current mode of operation and the at least one process expected to be active. An actual activity level of the plurality of resources is determined. If a deviation is detected between the expected activity level and the actual activity level, a source of unexpected activity is identified as a potential cause of the deviation. Policy guidelines are used to determine whether the unexpected activity is legitimate. If the unexpected activity is not legitimate, the source of the unexpected activity is classified as malware. | 06-28-2012 |
20130283073 | ADAPTIVE GRAPHICS SUBSYSTEM POWER AND PERFORMANCE MANAGEMENT - Examples are disclosed for adaptive graphics subsystem power and performance management including adjusting one or more power management or performance attributes for a graphics subsystem for a computing platform based on a comparison of a current quality metric to a target quality metric. The current and target quality metric to be separately determined based on current and target quality of service (QoS) values for power management and performance for at least portions of the computing platform. | 10-24-2013 |
20130347025 | PROVIDING REMOTE ACCESS VIA A MOBILE DEVICE TO CONTENT SUBJECT TO A SUBSCRIPTION - In one embodiment, the present invention includes a method for accessing content subscription information from a secure storage of a mobile device, communicating the content subscription information to an authorization service of a content provider with a request to receive content, receiving in the mobile device an authorization from the content provider which includes a time bound identifier corresponding to a time bounded authorization to receive the content during a time bounded window, and receiving and outputting the content from the mobile device during the time bounded window. Other embodiments are described and claimed. | 12-26-2013 |
20140088860 | METHOD, APPARATUS AND SYSTEM FOR MAPPING A COURSE OF A MOBILE DEVICE - Techniques and mechanisms for providing information to represent a course traversed by a mobile device. In an embodiment, navigation logic of the mobile device determines context data other than any geodetic data that specifies a position of the mobile device. With such context data, the navigation logic determines a sequence of estimates each for a respective position of the device on a course traversed by the mobile device. In another embodiment, determining the sequence of estimates includes determining a first estimate of a first position of the mobile device independent of any geodetic data that specifies the first position. Course information representing such a determined sequence includes timestamp information for the first estimate. | 03-27-2014 |
20140143147 | TRANSACTION FEE NEGOTIATION FOR CURRENCY REMITTANCE - Described herein are systems and methods for conducting remittances transactions with mobile and other electronic devices. In some embodiments, the systems and methods permit a user of a mobile or other electronic device to query multiple service providers for fee information from a single location. And in some instances, such fee information is provided to the user in real time. | 05-22-2014 |
20140168241 | TECHNIQUES FOR MANAGING SYSTEM POWER USING DEFERRED GRAPHICS RENDERING - An apparatus may include a memory to store one or more graphics rendering commands in a queue after generation. The apparatus may also include a processor circuit, and a graphics rendering command manager for execution on the processor to dynamically determine at one or more instances a total execution duration for the one or more graphics rendering commands, where the total execution duration comprises a total time to render the one or more graphics rendering commands. The graphics rendering command manager also may be for execution on the processor to generate a signal to transmit the one or more graphics rendering commands for rendering by a graphics processor when the total execution duration exceeds a graphics rendering command execution window. | 06-19-2014 |