Methods to discover, configure, and leverage relationships in internet of things (IoT) networks
First Claim
1. A method for discovering, configuring, and leveraging relationships in Internet of Things (IoT) networks, comprising:
- registering, by a processor, one or more objects into an IoT network;
tracking, by the processor, interactions among multiple IoT devices and locations where the tracked interactions occurred, wherein the multiple IoT devices include at least a first IoT device that belongs to an owner user associated with the IoT network and a second IoT device that belongs to at least one visitor user to the IoT network, and wherein the tracked interactions include at least one interaction between the second IoT device that belongs to the at least one visitor user and the one or more registered objects in the IoT network;
forming, by the processor, the one or more registered objects into one or more IoT groups according to usage associated with the one or more registered objects and one or more interactions among the tracked interactions that involve the one or more registered objects;
discovering, by the processor, an asymmetric relationship between the owner user associated with the IoT network and the at least one visitor user to the IoT network based on the tracked interactions and the locations associated therewith, including one or more interactions between the first IoT device that belongs to the owner user and the second IoT device that belongs to the at least one visitor user, wherein the asymmetric relationship is discovered based on data associated with the tracked interactions that occurred during a predefined time period;
assigning, by the processor, an identifier to the asymmetric relationship between the owner user and the at least one visitor user based on one or more of a time when the one or more interactions occurred or a location where the one or more interactions occurred;
assigning, by the processor, a rank to a relationship between the first IoT device and the second IoT device based on one or more attributes associated with the one or more interactions and one or more attributes associated with the second IoT device;
updating, by the processor, the rank assigned to the relationship between the first IoT device and the second IoT device in response to one or more subsequent interactions between the first IoT device and the second IoT device, wherein the rank assigned to the relationship is updated based on the one or more attributes associated with the one or more interactions, the one or more attributes associated with the second IoT device, and one or more attributes associated with the one or more subsequent interactions; and
controlling, by the processor, access that the second IoT device that belongs to the at least one visitor user has to each of the one or more IoT groups in the IoT network according to one or more permissions associated with the identifier assigned to the asymmetric relationship between the owner user and the at least one visitor user, wherein controlling the access comprises determining, by the processor, whether to grant the second IoT device access to the first IoT device based on the updated rank assigned to the relationship between the first IoT device and the second IoT device.
1 Assignment
0 Petitions
Accused Products
Abstract
The disclosure generally relates to various methods to discover, configure, and leverage relationships in Internet of Things (IoT) networks. More particularly, the methods disclosed herein may support automated processes to create configurable sub-divisions and access controls in an IoT network based on usage associated with objects that are registered in the IoT network and interactions among the registered objects. Furthermore, in one embodiment, relationships between IoT devices that belong to different users may be implicitly discovered and/or ranked based on meetings (e.g., interactions) between the IoT devices, and relationships between the different users may likewise be implicitly discovered and/or ranked. Moreover, locations and interactions associated with IoT devices may be tracked over time to further discover user-specific and potentially asymmetric relationships among the IoT devices and/or the users associated therewith (e.g., where one user considers another user a close friend and the other user considers the first user an acquaintance).
54 Citations
46 Claims
-
1. A method for discovering, configuring, and leveraging relationships in Internet of Things (IoT) networks, comprising:
-
registering, by a processor, one or more objects into an IoT network; tracking, by the processor, interactions among multiple IoT devices and locations where the tracked interactions occurred, wherein the multiple IoT devices include at least a first IoT device that belongs to an owner user associated with the IoT network and a second IoT device that belongs to at least one visitor user to the IoT network, and wherein the tracked interactions include at least one interaction between the second IoT device that belongs to the at least one visitor user and the one or more registered objects in the IoT network; forming, by the processor, the one or more registered objects into one or more IoT groups according to usage associated with the one or more registered objects and one or more interactions among the tracked interactions that involve the one or more registered objects; discovering, by the processor, an asymmetric relationship between the owner user associated with the IoT network and the at least one visitor user to the IoT network based on the tracked interactions and the locations associated therewith, including one or more interactions between the first IoT device that belongs to the owner user and the second IoT device that belongs to the at least one visitor user, wherein the asymmetric relationship is discovered based on data associated with the tracked interactions that occurred during a predefined time period; assigning, by the processor, an identifier to the asymmetric relationship between the owner user and the at least one visitor user based on one or more of a time when the one or more interactions occurred or a location where the one or more interactions occurred; assigning, by the processor, a rank to a relationship between the first IoT device and the second IoT device based on one or more attributes associated with the one or more interactions and one or more attributes associated with the second IoT device; updating, by the processor, the rank assigned to the relationship between the first IoT device and the second IoT device in response to one or more subsequent interactions between the first IoT device and the second IoT device, wherein the rank assigned to the relationship is updated based on the one or more attributes associated with the one or more interactions, the one or more attributes associated with the second IoT device, and one or more attributes associated with the one or more subsequent interactions; and controlling, by the processor, access that the second IoT device that belongs to the at least one visitor user has to each of the one or more IoT groups in the IoT network according to one or more permissions associated with the identifier assigned to the asymmetric relationship between the owner user and the at least one visitor user, wherein controlling the access comprises determining, by the processor, whether to grant the second IoT device access to the first IoT device based on the updated rank assigned to the relationship between the first IoT device and the second IoT device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. An apparatus, comprising:
-
at least one memory; and at least one processor coupled to the at least one memory, the at least one memory and the at least one processor configured to; register one or more objects into an Internet of Things (IoT) network; track interactions among multiple IoT devices and locations where the tracked interactions occurred, wherein the multiple IoT devices include at least a first IoT device that belongs to an owner user associated with the IoT network and a second IoT device that belongs to at least one visitor user to the IoT network, and wherein the tracked interactions include at least one interaction between the second IoT device that belongs to the at least one visitor user and the one or more registered objects in the IoT network; form the one or more registered objects into one or more IoT groups according to usage associated with the one or more registered objects and one or more interactions among the tracked interactions that involve the one or more registered objects; discover an asymmetric relationship between the owner user associated with the IoT network and the at least one visitor user to the IoT network based on the tracked interactions and the locations associated therewith, including one or more interactions between the first IoT device that belongs to the owner user and the second IoT device that belongs to the at least one visitor user, wherein the asymmetric relationship is discovered based on data associated with the tracked interactions that occurred during a predefined time period; assign an identifier to the asymmetric relationship between the owner user and the at least one visitor user based on one or more of a time when the one or more interactions occurred or a location where the one or more interactions occurred; assign a rank to a relationship between the first IoT device and the second IoT device based on one or more attributes associated with the one or more interactions and one or more attributes associated with the second IoT device; update the rank assigned to the relationship between the first IoT device and the second IoT device in response to one or more subsequent interactions between the first IoT device and the second IoT device, wherein the rank assigned to the relationship is updated based on the one or more attributes associated with the one or more interactions, the one or more attributes associated with the second IoT device, and one or more attributes associated with the one or more subsequent interactions; and control access that the second IoT device that belongs to the at least one visitor user has to each of the one or more IoT groups in the IoT network according to one or more permissions associated with the identifier assigned to the asymmetric relationship between the owner user and the at least one visitor user, wherein the controlled access is used to determine whether to grant the second IoT device access to the first IoT device based on the updated rank assigned to the relationship between the first IoT device and the second IoT device. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A non-transitory computer-readable storage medium having computer-executable instructions recorded thereon, wherein executing the computer-executable instructions on one or more processors causes the one or more processors to:
-
register one or more objects into an Internet of Things (IoT) network; track interactions among multiple IoT devices and locations where the tracked interactions occurred, wherein the multiple IoT devices include at least a first IoT device that belongs to an owner user associated with the IoT network and a second IoT device that belongs to at least one visitor user to the IoT network, and wherein the tracked interactions include at least one interaction between the second IoT device that belongs to the at least one visitor user and the one or more registered objects in the IoT network; form the one or more registered objects into one or more IoT groups according to usage associated with the one or more registered objects and one or more interactions among the tracked interactions that involve the one or more registered objects; discover an asymmetric relationship between the owner user associated with the IoT network and the at least one visitor user to the IoT network based on the tracked interactions and the locations associated therewith, including one or more interactions between the first IoT device that belongs to the owner user and the second IoT device that belongs to the at least one visitor user, wherein the asymmetric relationship is discovered based on data associated with the tracked interactions that occurred during a predefined time period; assign an identifier to the asymmetric relationship between the owner user and the at least one visitor user based on one or more of a time when the one or more interactions occurred or a location where the one or more interactions occurred; assign a rank to a relationship between the first IoT device and the second IoT device based on one or more attributes associated with the one or more interactions and one or more attributes associated with the second IoT device; update the rank assigned to the relationship between the first IoT device and the second IoT device in response to one or more subsequent interactions between the first IoT device and the second IoT device, wherein the rank assigned to the relationship is updated based on the one or more attributes associated with the one or more interactions, the one or more attributes associated with the second IoT device, and one or more attributes associated with the one or more subsequent interactions; and control access that the second IoT device that belongs to the at least one visitor user has to each of the one or more IoT groups in the IoT network according to one or more permissions associated with the identifier assigned to the asymmetric relationship between the owner user and the at least one visitor user, wherein the controlled access is used to determine whether to grant the second IoT device access to the first IoT device based on the updated rank assigned to the relationship between the first IoT device and the second IoT device. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification