摘要:
Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a determination may be made as to whether to permit the attempt based on a context-based security policy. In one example, the context-based security policy is obtained from one or more of a user profile, a multi-user data source and a cloud service.
摘要:
Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed.
摘要:
Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform.
摘要:
Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.
摘要:
Methods, apparatus, systems and articles of manufacture are disclosed to pair devices to an in-body network. An example apparatus disclosed herein includes a device capability manager to identify remote sensors associated with a candidate medical device, an encryption engine to provide the candidate medical device with hashing instructions to be applied to input values from selected ones of the remote sensors, a measurement engine to acquire input values from local sensors corresponding to the selected ones of the available remote sensors during a measurement schedule, the encryption engine to apply the hashing instructions to the input values from the local sensors, and a pairing engine to authorize the candidate medical device when an encryption key associated with the remote sensors includes a threshold indication of parity with an encryption key associated with the local sensors.
摘要:
Systems and methods may provide for implementing a counteroffer generation service. In one example, the method may include detecting an inquiry relating to an item offered by a vendor, analyzing the inquiry to determine the item, generating a counteroffer relating to the item, generating counteroffer code including the counteroffer relating to the item, and conducting a transaction relating to the item utilizing the counteroffer code.
摘要:
Described herein are systems and methods for managing and distributing device and/or software settings. In some embodiments, the systems and methods permit a first device to upload settings information and/or user information to a network server. The network server may store such settings information and post it for download by at least one second device. Mechanisms for establishing a trust rating for such settings information are also described.
摘要:
Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy.
摘要:
Generally, this disclosure describes a method and system for route personalization. A method may include, in an embodiment, requesting that a user of a computing device provide a trip modifier in response to a request from the user to map a route from a first location to a second location; acquiring objective data related to the trip modifier for at least one possible route from the first location to the second location; generating a weighted route recommendation associated with each possible route based on the acquired objective data and the trip modifier; and displaying each possible route and its associated weighted route recommendation on the computing device, wherein the trip modifier comprises at least one user characteristic and each weighted route recommendation is configured to provide a personalized route recommendation to the user for the respective associated possible route.
摘要:
A system includes a first mobile device configured to initiate communication with at least one other mobile device. The first mobile device includes a status indicator configured to provide a persistent visual indication to a user of the status of a mute function of the first user device during the active communication. The first mobile device further includes a user interface configured to receive predefined user input and allow the user to toggle between mute and un-mute states based on the user input regardless of whether a display of the device is shut off and/or the user interface is locked.