Abstract:
Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred.
Abstract:
Various embodiments are generally directed to an apparatus, method and other techniques for detecting one or more inputs on a back side of a housing an determining a pattern based on the detected one or more inputs on the back side of the housing. Once a pattern is determined, a pattern characteristic based on the pattern may be determined and a user may be authenticated based on a comparison of the pattern characteristic and stored data. Other embodiments are described and claimed.
Abstract:
Systems, apparatuses, and methods for enabling sensor discovery in autonomous devices herein. An example system for enabling dynamic sensor discovery including a client that includes an autonomous device. The autonomous device is capable of navigating from a current location to a destination location using sensor data. The client provides a request for sensor information for sensors along a planned route and receives respective sensor information for each of a set of selected sensors selected by a data server based on the request. The client subscribes to a data feed of a sensor of the set of selected sensors along the planned route based on sensor information corresponding to the sensor and client analyzes the data feed to determine whether to proceed with the planned route.
Abstract:
Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
Abstract:
Various systems and methods for an intelligent ringer in smartphones are described herein. A system for implementing intelligent notifications includes a communication module to receive at a compute device, an indication of an incoming communication, a notification module to present from the compute device, a notification of the incoming communication, an audio processing module to determine whether a change in ambient noise occurs around the compute device while the notification is being presented, and a rules module to reference a rules engine to determine an action based on whether the change in ambient noise occurs, where the notification module is to present the notification in accordance with the action.
Abstract:
Various systems and methods for authenticating users via image manipulation are described herein. In various embodiments, an initial image associated with a stored profile of the user is presented on a display device. Input including a manipulation of the initial image to transform the initial image to a manipulated initial image is received on an input device. The user is authenticated in response to the manipulated initial image sufficiently matching a target manipulated image associated with the stored profile of the user. In various embodiments, prior to presenting the initial image, a facial image of the user is captured. The user is identified by applying a facial recognition technique to the captured facial image of the user. The display device is arranged to present the initial image in response to identifying the user as having a stored profile.
Abstract:
Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device.
Abstract:
Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed.
Abstract:
Various systems and methods for an intelligent ringer in smartphones are described herein. A system for implementing intelligent notifications includes a communication module to receive at a compute device, an indication of an incoming communication, a notification module to present from the compute device, a notification of the incoming communication, an audio processing module to determine whether a change in ambient noise occurs around the compute device while the notification is being presented, and a rules module to reference a rules engine to determine an action based on whether the change in ambient noise occurs, where the notification module is to present the notification in accordance with the action.
Abstract:
Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access.