摘要:
Systems and methods may provide for identifying a plurality of devices and routing a call between a first device in the plurality of devices and a second device in the plurality of devices. The routing of the call may be in response to a visual condition with respect to a user of the first device. In one example, the visual condition is detected based on image data associated with a surrounding environment and the visual condition is one or more of a gaze of the user and a gesture of the user.
摘要:
A technique allows a system to determine online user activity for a user associated with a user client device. The online user activity includes private content, publicly available content and content shared to a social group related to the user. The system determines a social behavior risk score, a social score, and a security risk score for the user and the content they share with others, and provides one or more recommendations to the user in response to determining the social behavior risk score and the security risk score for the user.
摘要:
A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity.
摘要:
Systems and methods may provide for identifying a virtual geo-fence for a plurality of devices. Additionally, a condition may be detected with respect to two or more devices in the plurality of devices, wherein a status determination may be conducted as to whether at least one of the two or more devices has left the virtual geo-fence based on the condition.
摘要:
Apparatus, computer-readable storage medium, and method associated with provision of a virtual environment. In embodiments, a computing apparatus may include a processor and a virtualization module. The virtualization module may be operated by the processor to provide the virtual environment, based at least in part on real time data of a physical environment virtualized in the virtual environment. In embodiments, the computing apparatus may further include a physical environment module. The physical environment module may be operated by the processor to acquire the real time data of the physical environment for the virtualization module. Other embodiments may be described and/or claimed.
摘要:
Methods, machines, and systems manage security policies of heterogeneous infrastructure and computing devices of a network. Security policy repository houses security policies that are pushed over the network by a policy decision point PDP to appropriate security-enabled devices (policy enforcement points (PEPs)) for enforcement. Using a closed feedback loop, a policy feedback point (PFP) collects and processes data from intrusions, alerts, violations, and other abnormal behaviors from a variety of PEPs or logs produced from PEPs. This data is sent as feedback to the policy repository. The PDP detects the data and analyzes it to determine if policy updates (which can be dynamic and automatic) need to be adaptively made and dynamically pushed to PEPs. The PDP can also send console messages or alerts to consoles or administrators.
摘要:
Provided are a method, system, and program for deriving and using data access control information to determine whether to permit requested derivations of data elements. Data access control information is initialized for each of a plurality of data elements, wherein the data access control information for each associated data element includes a user access list indicating authorized users and a data access list indicating at least one data element that may be subject to a derivation operation with the associated data element. A request is received from one user to subject a first data element and a second data element to a derivation operation. The data access control information for one of the first and second data elements is processed to determine whether the user access list and data access list in the processed data access control information permits the user to perform the requested derivations of the first and second data elements.
摘要:
Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation.
摘要:
Various techniques to establish trust of a web page to prevent malware redirects from web searches or hyperlinks are described. An apparatus may include a trust engine to determine an indication of trustworthiness of each of one or more web pages. The trust engine to append information in each of the tags of the one or more web pages based on the determined indication of trustworthiness for that web page. Other embodiments may be described and claimed.
摘要:
Systems and methods may provide for receiving web content and determining a trust level associated with the web content. Additionally, the web content may be mapped to an execution environment based at least in part on the trust level. In one example, the web content is stored to a trust level specific data container.