Abstract:
A method for managing communication in a plurality of Internet of Things (IoT) networks includes receiving a communication request initiated by an IoT device in one of the plurality of IoT networks for a destination IoT device located in one of the plurality of IoT networks. Suitability of an existing communication session between the IoT device and the destination IoT device is determined. Based on determining unsuitability of the existing communication session, a new communication session between the IoT device and the destination IoT device is selectively initiated. In response to determining suitability of the existing communication session, the existing communication session for the communication request is selectively reused. At least one initiating cause for a communication event and associated resolutions on occurrence of the communication event to maintain one of the new communication session and the existing communication session that is suitable is iteratively determined.
Abstract:
This disclosure relates generally to methods and systems for minimizing privacy intrusion during internet of things lawful interception. In one embodiment, a topology of probes system for providing lawful interception information for an internet of things network is provided. The topology of probes system may comprise a super-probe connected to a lawful interception gateway by a set of LI-interfaces and a hierarchy of probes connected to the super-probe. Further, the super-probe and the hierarchy-of-probes may be configured to perform LI operation according to one or more privacy requirement settings and to provide lawful interception information collected by the LI operation. Additionally, the privacy requirement settings may comprise rules that govern at least one of: content-based data exposure, prevention of access of information by predetermined users, and obfuscation of predetermined information.
Abstract:
A method for providing lawful interception information for an Internet of Things network (IoT Network) is provided. The method is performed by a topology of probes and comprises: receiving, through an interface, a request for information about a lawful interception target, the request including a specification for the information to be tracked and reported; generating a hierarchy of information elements based on the specification; determining a set of data sources for providing the requested information according to the hierarchy of information elements; determining a hierarchy of probes based on the set of the data sources; configuring the topology of probes based on a set of configurations; activating LI operation in the topology of probes; performing LI operation by the topology of probes; verifying effectiveness of reporting conforming to reporting requirements and taking corrective action; and updating learning data in the historical database at the end of LI operation.
Abstract:
The present disclosure provides method and system for dynamically adapting privacy and security for IoT communication. The method determines allowance of pre-engagement communication between communicating local entity (CLE) and communicating remote entity (CRE) based on perception information formed for the CRE. The method determines session filters to be applied during pre-engagement communication to identify violations. Further, if interest level for the pre-engagement communication is greater than a predefined threshold, engagement communication is established between the CRE and CLE. During the engagement communication, engagement filters are determined and applied to identify any violations. Further, during the engagement communication, one or more privacy and security related events are identified and actions are also identified to handle the one or more privacy and security related events, for dynamically adapting privacy and security for IoT communication. The actions include terminating the engagement communication, updating perceptions, refining filters and continuing engagement communication.
Abstract:
Systems, methods, and non-transitory computer readable media for determining the emotional state of a user are described herein. In one example, the method for determining the emotional state of the user comprises receiving a feed from a sensor at a default sampling frequency, and analyzing the feed to determine facial features of a user. The method further comprises computing an emotional quotient of the user based on the facial features, determining a trigger to re-compute the sampling frequency the feed, based in part on the emotional quotient and computing a new sampling frequency based in part on the trigger. Thereafter, the method comprises generating instructions for the sensor to capture the feed at the new sampling frequency.
Abstract:
Systems, methods, and non-transitory computer readable media for determining the emotional state of a user are described herein. In one example, the method for determining the emotional state of the user comprises receiving a feed from a sensor at a default sampling frequency, and analyzing the feed to determine facial features of a user. The method further comprises computing an emotional quotient of the user based on the facial features, determining a trigger to re-compute the sampling frequency the feed, based in part on the emotional quotient and computing a new sampling frequency based in part on the trigger. Thereafter, the method comprises generating instructions for the sensor to capture the feed at the new sampling frequency.
Abstract:
A method for managing communication in a plurality of Internet of Things (IoT) networks includes receiving a communication request initiated by an IoT device in one of the plurality of IoT networks for a destination IoT device located in one of the plurality of IoT networks. Suitability of an existing communication session between the IoT device and the destination IoT device is determined. Based on determining unsuitability of the existing communication session, a new communication session between the IoT device and the destination IoT device is selectively initiated. In response to determining suitability of the existing communication session, the existing communication session for the communication request is selectively reused. At least one initiating cause for a communication event and associated resolutions on occurrence of the communication event to maintain one of the new communication session and the existing communication session that is suitable is iteratively determined.
Abstract:
A method for improved end-user experience in an enterprise network is disclosed. In one embodiment, key performance indicators (KPIs) of network devices, applications and input services are determined. Further, KPIs of base services are determined using the KPIs of network devices, applications and input services. Furthermore, the KPIs are compared with KPI threshold levels and KPI level alerts are generated. Moreover, key quality indicators (KQIs) of base services are determined using the KPIs. Also, the KQIs are compared with KQI threshold levels and KQI level alerts are generated. Further, a composite service quality (CSQ) index of a composite service is computed using the KQIs. Furthermore, the CSQ index is compared with CSQ index threshold levels and a CSQ level alert is generated. In addition, possible problem conditions are detected and then possible problem scenarios are determined and analyzed. Also, actionable items are identified based on the possible problem scenarios.