Pooja Sinha, IBM
Samrat Dutta, IBM
Sundaresan Krishnaswami, Fiberlink, An IBM company
Phones have evolved exponentially in every aspect in the last few years, from a traditional landline to cordless to mobile to smartphone, it has improved in terms of capability, storage, features, components, but above all smartness.
The question arises are smartphones really smart by themselves? Can they solve their own problems? Can they monitor, analyze, repair or archive things without human intervention?
A smartphone is no longer just a calling device, but is used today for almost everything, and this is made possible by, first, the phone itself – with its high-performance yet optimized hardware, and its Operating System – which has opened an avenue for smartphone applications to make the best use of the phone’s features while greatly enhancing user experience.
They are several layers of data available on a smartphone that can help both device manufacturers and application developers to leverage the inherent smartness for a myriad of applications such as security, usability or performance.
Our paper is a collaborative effort to analyze such heuristics already applied or researched in the field and present it as a quick reference for product architects to apply it in identity protection, threat protection, optimize resource usage on a smartphone, which otherwise applications may take it for granted.
Target audience: Intermediate
Pooja Sinha, Samrat Dutta, and Sundaresan Krishnaswami, 2014 Technical Paper, Paper