Abstract:
The disclosure generally relates to behavioral analysis to automate monitoring Internet of Things (IoT) device health in a direct and/or indirect manner. In particular, normal behavior associated with an IoT device in a local IoT network may be modeled such that behaviors observed at the IoT device may be compared to the modeled normal behavior to determine whether the behaviors observed at the IoT device are normal or anomalous. Accordingly, in a distributed IoT environment, more powerful “analyzer” devices can collect behaviors locally observed at other (e.g., simpler) “observer” devices and conduct behavioral analysis across the distributed IoT environment to detect anomalies potentially indicating malicious attacks, malfunctions, or other issues that require customer service and/or further attention. Furthermore, devices with sufficient capabilities may conduct (local) on-device behavioral analysis to detect anomalous conditions without sending locally observed behaviors to another aggregator device and/or analyzer device.
Abstract:
The disclosure relates to software that provides fine-grained user control over when and how a software-based privacy filter is used to reduce clarity and/or visibility associated with content rendered on a display screen. For example, according to various aspects, the software may have access to the display screen and various other components that can be used to detect and/or track a current context associated with information displayed on the screen. As such, based on the current context, the software may determine an area displayed on a screen having current interest to one or more authorized users and activate a software-based privacy filter configured to reduce the clarity and/or visibility associated with information displayed on the screen outside the area having the current interest to the one or more authorized users as needed (e.g., based on a sensitivity level associated with the displayed information, sensor-based inputs indicating a sensitive context, etc.).
Abstract:
A method and apparatus for performing authentication may comprise: determining a first value of a dynamic password applicable for a first scenario, the dynamic password having a plurality of values for a plurality of scenarios defined by at least one parameter; authenticating a user in the first scenario by a device based on the first value of the dynamic password; determining a second value of the dynamic password applicable for a second scenario; and authenticating the user in the second scenario by the device based on the second value of the dynamic password.