Abstract:
An exemplary method includes an unintended-dialing detection and prevention system 1) determining, based on an unintended-dialing detection heuristic, a phone dialing pattern associated with a phone dialing event of a phone device, 2) determining, based on the unintended-dialing detection heuristic, that the phone dialing pattern associated with the phone dialing event matches a predefined phone dialing pattern indicative of unintended dialing, and 3) automatically performing, in response to the determining that the phone dialing pattern associated with the phone dialing event matches the predefined phone dialing pattern indicative of the unintended dialing, an operation configured to prevent a placement of a phone call by the phone device in response to the phone dialing event. Corresponding methods and systems are also disclosed.
Abstract:
Method, device, and non-transitory storage medium to obtain program historical data and social network data associated with users that receive one or more programs via one or more channels; calculate a social similarity value; calculate a channel-interest similarity value; calculate a similarity index value based on the social similarity value and the channel-interest similarity value; calculate a program weight value for each program; calculate a stay-time, for each channel, that indicates a time period each of the users remained on each channel; calculate based on each program weight value, each stay-time, and each similarity index value, a channel weight for each channel; and select based on each channel weight, one or more channels to recommend to at least one of the users.
Abstract:
An exemplary method includes an unintended-dialing detection and prevention system 1) determining, based on an unintended-dialing detection heuristic, a phone dialing pattern associated with a phone dialing event of a phone device, 2) determining, based on the unintended-dialing detection heuristic, that the phone dialing pattern associated with the phone dialing event matches a predefined phone dialing pattern indicative of unintended dialing, and 3) automatically performing, in response to the determining that the phone dialing pattern associated with the phone dialing event matches the predefined phone dialing pattern indicative of the unintended dialing, an operation configured to prevent a placement of a phone call by the phone device in response to the phone dialing event. Corresponding methods and systems are also disclosed.
Abstract:
A method for scalable and secure vehicle to everything communications may include receiving telematics data from a plurality of vehicles and tracking the vehicles within a window which is centered based on the telematics data. The position of the window may be determined based on positions of the vehicles. The method may include dividing the vehicles within the window into partitions having sizes based on a maximum number of vehicles within the partitions, and determining a metric representing a suitability of communications between the vehicles in the window.
Abstract:
Systems and methods herein represent an IoT device as an endpoint of private cloud. A virtualization service receives an IoT identifier for an IoT device and a network address for a virtual endpoint for the IoT device. The virtual endpoint for the IoT device is included in a host cloud platform. The virtualization service maps the IoT identifier to the network address in a distributed data structure for the service provider network and provides instructions, for an edge node for the service provider network, to provide network-layer access controls based on the mapping. The edge node for the service provider network receives an access request from the IoT device, applies a network-layer access control for the IoT device based on the instructions, receive IoT data from the IoT device when the edge node permits access by the IoT device, and forwards the IoT data to the virtual endpoint.
Abstract:
A device can receive a request to determine a set of navigational directions, and can obtain a set of traffic objects associated with a first map layer. The set of traffic objects can include nodes to identify one or more geographic locations and one or more links to identify one or more geographic areas between the nodes. The device can determine a shortest-path tree by analyzing the set of traffic objects, the shortest-path tree being associated with a static data structure. The device can generate a dynamic data structure that includes the shortest-path tree and a set of additional traffic objects associated with a second map layer. The device can determine a shortest path by analyzing traffic objects associated with the shortest-path tree and the set of additional traffic objects. The device can provide the set of navigational directions to indicate the shortest path.
Abstract:
A network device receives a plurality of framework definitions corresponding to a respective plurality of device platforms, wherein each of the device platforms comprises at least one device. The network device generates a plurality of generalized framework definitions for each of the plurality of device platforms, wherein the plurality of generalized framework definitions comprise basic linguistic components corresponding to elements in the respective plurality of framework definitions. The network device receives data from the at least one device for each of the device platforms. The network device extracts data from the received data based on the plurality of generalized framework definitions. The network device automatically identifies contexts that include at least one device for each of the at least two device platforms based on the extracted data. The network device transmits instructions to the at least one device for each of the at least two device platforms based on one of a rule or a request associated with the identified one or more contexts.
Abstract:
A network device stores capability designations associated with Internet-of-Things (IoT) devices and receives, from a customer device, one or more of the capability designations associated with a first type of IoT device. The network device receives event data generated by the first type of IoT device and maps the event data to the one or more of the capability designations. The mapping produces normalized IoT data for the first type of IoT device. The network device generates semantic information for the normalized IoT data and assembles a device model for the first type of IoT device. The device model includes the one or more of the capability designations and the semantic information.
Abstract:
A network device receives, from a node in an Internet-of-Things (IoT) network, an access request for a user authenticated via the node and identifies the access request as from either of a trusted node or an untrusted node in the IoT network. When the access request is from an untrusted node, the network device identifies a hash key for the access request, wherein the hash key is derived from an access list for the IoT network; broadcasts the hash key to other trusted nodes in the IoT network; and validates the access request based on a solution consensus from the other trusted nodes. When the access request is from a trusted node, the network device confirms mutual trust with the trusted node via an encrypted key exchange, and validates the access request based on the mutual trust with the trusted node.
Abstract:
A network device logs transmission control protocol (TCP) flow data for connections between registered devices that are registered for use of secure Internet of Things (IoT) application programming interfaces (APIs). The logging generates logged flow data. The network device receives, from a first registered device, a call validation request for an IoT API call directed to the first registered device from a second registered device. The call validation request includes packet information of the IoT API call. The network device compares the packet information with the logged TCP flow data. When the comparing indicates a match of the packet information and the logged TCP flow data, the network device sends a response to the first registered device to accept the IoT API call. Otherwise, the network device sends a response to the first registered device to reject the IoT API call.