Abstract:
Methods and systems are disclosed for incrementally sharing increasing amounts of information between two or more user devices. An aspect detects a second user device that is proximate a first user device, receives first log data from the second user device, determines whether the first user device and the second user device interacted with each other during a first period of time based on the first log data, assigns a first trust level to the second user device based on the first log data, wherein the second log data is more private than the first log data, determines whether the first user device and the second user device interacted with each other during a second period of time based on the received second log data, and assigns a second trust level to the second user device based on the second log data.
Abstract:
Method and systems for deriving relationships from overlapping time and location data are disclosed. A first user device receives time and location data for a first user, the time and location data for the first user representing locations of the first user over time, reduces the time and location data for the first user around a first plurality of artificial neurons, wherein each of the first plurality of artificial neurons represents a location of the first user during a first time, transmits the reduced time and location data for the first user to a server, wherein the server determines whether or not the first user and a second user are related based on determining that the first user and the second user have an artificial neuron in common among the first plurality of artificial neurons and a second plurality of artificial neurons.
Abstract:
Method and apparatuses for constructing a grammar to describe interactions among a plurality of devices in a network are disclosed. An aspect receives, by a network interface of a device, device capabilities of each of the plurality of devices, generates, by a reduced device list generator of the device, a reduced device list representing groupings of the plurality of devices based on the device capabilities, models, by an interaction sequence modeler of the device, one or more sequences of interactions among the plurality of devices using the reduced device list, constructs, by a grammar construction module of the device, the grammar based on the modeled one or more sequences of interactions, and stores the grammar in a memory of the device.
Abstract:
The disclosure relates to facilitating and tracking joint purchases among multiple parties. More particularly, multiple parties may use a joint purchasing service to jointly purchase one or more items according to a consecutive, concurrent, or other ownership distribution that the parties agreed upon, and the joint purchasing service may implement one or more controls to track and maintain the ownership distribution. For example, locations associated with jointly purchased items may be tracked such that joint purchasers may be notified when possession should be transferred (e.g., when the current owner's turn expires, when one owner exceeds a usage proportion allocated thereto, etc.). Furthermore, ownership over certain jointly purchased items may be automatically managed (e.g., an electronic item may be transferred from one joint owner to another when the current owner's turn expires, joint owners may be required to be in proximity to use the item, etc.).
Abstract:
The disclosure is related to confirming an identity of a first user of a first user device. An aspect includes receiving a request to confirm the identity of the first user, determining whether or not there is a relationship between the first user or the first user device and a second user of a second user device or the second user device based on a first list of user interactions associated with the first user device and a second list of user interactions associated with the second user device, and confirming the identity of the first user based on determining that there is a relationship between the first user or the first user device and the second user or the second user device.
Abstract:
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
Abstract:
The disclosure relates to machine-learning behavioral analysis to detect device theft and unauthorized device usage. In particular, during a training phase, an electronic device may generate a local user profile that represents observed user-specific behaviors according to a centroid sequence, wherein the local user profile may be classified into a baseline profile model that represents aggregate behaviors associated with various users over time. Accordingly, during an authentication phase, the electronic device may generate a current user profile model comprising a centroid sequence re-expressing user-specific behaviors observed over an authentication interval, wherein the current user profile model may be compared to plural baseline profile models to identify the baseline profile model closest to the current user profile model. As such, an operator change may be detected where the baseline profile model closest to the current user profile model differs from the baseline profile model in which the electronic device has membership.
Abstract:
The present disclosure generally relates to systems and methods for establishing and maintaining communication between two or more communication devices coupled to communication networks. Some specific aspects relate to communication between a plurality of communication devices each of which is coupled to a respective network. Other aspects relate to establishing such communication by way of contact lists maintained and facilitated on systems coupled to the networks. Users of multiple communication networks, such as VoIP, PSTN and wireless, employ multiple communication devices to communicate with their contacts. For example, a VoIP enabled computer is necessary to access contacts on a VoIP network and a mobile or cellular telephone is used to access contacts on wireless and PSTN networks. A contact list, stored on one communication device, in some instances, cannot be accessed from another communication device. For example, a contact list stored in a VoIP enabled computer cannot be accessed from PSTN or wireless phone devices. Various embodiments described herein provide a convenient solution that can integrate contacts stored on different communication devices and make them accessible from a single device.
Abstract:
Systems and methods are disclosed for determining a context-dependent virtual distance based on stigmergic interference. The method may include obtaining environmental status information relating to an environment in proximity to a client device, calculating, based on the obtained environmental status information, the context-dependent virtual distance between the client device and a user of the client device, and controlling a user signaling pattern of the client device based on the calculated context-dependent virtual distance.
Abstract:
Methods and systems for receiving an offer from an entrusting device to access one or more devices are disclosed. A trust model module of a first device receives the offer from the entrusting device to provide the first device with permission to access the one or more devices, and determines whether or not to accept the offer from the entrusting device to provide the permission to access the one or more devices, wherein the first device determines whether or not to accept the permission to access the one or more devices based on a relationship between the first device and the entrusting device and/or a relationship between the first device and the one or more devices.