Abstract:
A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed.
Abstract:
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.
Abstract:
Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
Abstract:
Apparatuses, methods and storage medium associated with providing mobile cloud proxy service to mobile client devices are disclosed. In embodiments, a mobile cloud proxy device may include a cloud proxy server to provide the cloud proxy service to the mobile client devices while the mobile client devices are within a mobile cloud proxy service area serviced by the cloud proxy server. The cloud proxy server may include a device and service area management module to manage the mobile cloud proxy service area and the one or more mobile client devices, and a policy and service management module to manage and provide the mobile cloud proxy service in accordance with one or more cloud proxy service policies. Other embodiments may be disclosed and/or claimed.
Abstract:
Apparatuses, methods and storage medium associated with provision and receipt of virtual sensor service, are disclosed. In embodiments, an apparatus may comprise a virtual sensor server configured to provide virtual sensor service to one or more mobile client devices to virtualize one or more sensors of each of the one or more mobile client devices. Virtualization of the one or more sensors of each of the one or more mobile client devices may comprise provision of sensor data to each of the one or more mobile client devices, or reporting of sensor data to one or more recipients external to the one or more mobile client devices on behalf of respective one or ones of the one or more mobile client devices. The provision or the reporting supersedes the corresponding sensor on the respective one or more of the mobile client devices. Other embodiments may be described and/or claimed.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to pair devices to an in-body network. An example apparatus disclosed herein includes a device capability manager to identify remote sensors associated with a candidate medical device, an encryption engine to provide the candidate medical device with hashing instructions to be applied to input values from selected ones of the remote sensors, a measurement engine to acquire input values from local sensors corresponding to the selected ones of the available remote sensors during a measurement schedule, the encryption engine to apply the hashing instructions to the input values from the local sensors, and a pairing engine to authorize the candidate medical device when an encryption key associated with the remote sensors includes a threshold indication of parity with an encryption key associated with the local sensors.
Abstract:
A touchscreen-based user interface that allows the user to perform information searching on a mobile information appliance, such as a tablet computer or smart phone. By moving one or two fingers in appropriate direction(s) across the touchscreen, a search may be specified. Moreover, by using the appropriate gestures, a search may be broadened or narrowed by specifying additional search terms. This may be performed iteratively to allow the user to discover information, at various times narrowing or broadening a search.
Abstract:
Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a determination may be made as to whether to permit the attempt based on a context-based security policy. In one example, the context-based security policy is obtained from one or more of a user profile, a multi-user data source and a cloud service.
Abstract:
Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
Abstract:
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password.