Patent classifications
G06F21/10
Systems, methods, and apparatus for software defined silicon security
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.
Setup procedures for an electronic device
In some embodiments, an electronic device can guide the user in setting up the device for the first time or after a factory reset. In some embodiments, an electronic device facilitates suggesting and installing applications on the electronic device during device setup. In some embodiments, an electronic device facilitates transferring settings and information from another electronic device during device setup.
Tamper resistant device for an integrated circuit card
A tamper resistant device can be used for an integrated circuit card. The device includes memory storing a first security domain that includes a telecommunication profile and a second security domain that includes an application profile. A first physical interface is configured to be coupled to a baseband processor configured to operate with a mobile telecommunications network. A second physical interface configured to be coupled to an application processor. The first physical interface configured to allow the baseband processor to access the telecommunication profile and the second physical interface is configured to allow the application processor to access the application profile. The tamper resistant device is configured to enable accessibility to the application profile if corresponding commands are received at the first interface and to enable accessibility to the telecommunication profile if corresponding commands are received at the second interface.
Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content.
Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content.
Multiplexing and congestion control
Methods, systems and devices for network congestion control exploit the inherent burstiness of network traffic, using a wave-based characterization of network traffic and corresponding multiplexing methods and approaches.
System and method for providing multimedia digital rights transfer
A method for transferring digital multimedia rights, the method including but not limited to requesting permission from the destination end user to transfer the digital multimedia rights to the destination end user device; and if the permission is received from the destination end user, canceling the source set of digital multimedia rights associated with the source end user and transferring the source set of digital multimedia rights associated with the source end user to the destination end user device. A system and computer program product are disclosed for performing the method.
System and method for providing multimedia digital rights transfer
A method for transferring digital multimedia rights, the method including but not limited to requesting permission from the destination end user to transfer the digital multimedia rights to the destination end user device; and if the permission is received from the destination end user, canceling the source set of digital multimedia rights associated with the source end user and transferring the source set of digital multimedia rights associated with the source end user to the destination end user device. A system and computer program product are disclosed for performing the method.
Data subscription management system
A method includes a digital subscription management system (DSMS) receiving from a source system a request to perform an edit of at least one data object, the DSMS sending a request for response (RFR) to subscribing systems having a copy of the at least one data object, the DSMS receiving a response from the subscribing systems, and the DSMS performing the edit.
Data subscription management system
A method includes a digital subscription management system (DSMS) receiving from a source system a request to perform an edit of at least one data object, the DSMS sending a request for response (RFR) to subscribing systems having a copy of the at least one data object, the DSMS receiving a response from the subscribing systems, and the DSMS performing the edit.