Abstract:
Computer-readable storage media, apparatuses, and methods associated with context dependent reactions derived from human responses are disclosed herein. An apparatus may, in some embodiments, include a communication module and a reaction agent. The reaction agent may be configured to transmit, via the communication module, a request to a remote data source. The request may include context data indicative of an operational context of the apparatus. The reaction agent may receive, in response to the request, via the communication module, reaction data for the apparatus to react to the operational context. In embodiments, the reaction data may be derived from previous observations of human response to a context similar to the operational context indicated by the context data of the request. Other embodiments may be described and/or claimed herein.
Abstract:
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
Abstract:
Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
Abstract:
Technologies for monitoring vehicle traffic include a traffic analysis server that receives infrastructure data from infrastructure sensors positioned along a road segment of a road and vehicle data from one or more vehicles travelling along the road segment. The traffic analysis server determines whether anomalies are present in the traffic data through the road segment based on an expected traffic behavior for the road segment. The traffic analysis server determines the expected traffic behavior for the road segment in a particular time window based on a historical traffic pattern associated with the road segment, based on historical vehicle data and historical infrastructure data captured during a prior time window corresponding to the particular time window for that road segment. Other embodiments are described and claimed.
Abstract:
Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.
Abstract:
A Cloud federator may be used to allow seamless and transparent access by a Cloud Client to Cloud services. Federation may be provided on various terms, including as a subscription based real-time online service to Cloud Clients. The Cloud federator may automatically and transparently effect communication between the Cloud Client and Clouds and desired services of the Clouds, and automatically perform identity federation. A Service Abstraction Layer (SAL) may be implemented to simplify Client communication, and Clouds/Cloud services may elect to support the SAL to facilitate federation of their services.
Abstract:
Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed.
Abstract:
Various systems and methods for a collaborative phone reputation system are described herein. A system for implementing a collaborative phone reputation system includes a compute device comprising: a call handling module to detect, at the compute device, an incoming call for a user of the compute device; a scoring module to determine a local probabilistic score that the incoming call is desirable for the user; and an execution module to perform an action at the compute device based on the local probabilistic score.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
A method may include receiving, using at least one processor, location information that includes a location of an unmanned aerial vehicle (UAV); querying, using the at least one processor, a policy database to retrieve a notification condition for a first property with respect to UAVs; calculating, using the at least one processor, a distance between the UAV and the first property using the received location information determining, using the at least one processor, if the distance of the UAV with respect to the first property is within a range defined in the notification condition for the first property; and transmitting, using the at least one processor, a notification to a party associated with the first property when the distance of the UAV with respect to the first property is within the range defined in the notification condition for the first property.