International Business Machines Corporation
BYPASSING SECURITY VULNERABLE AND ANOMALOUS DEVICES IN MULTI-DEVICE WORKFLOW

Last updated:

Abstract:

In an approach for bypassing security vulnerable and anomalous devices in a multi-device workflow, a processor monitors behavior and network traffic of a plurality of smart devices within a multi-smart device system. A processor identifies a first smart device of the plurality of smart devices with at least one of a security vulnerability and an anomaly. A processor identifies a multi-smart device workflow that includes the first smart device. A processor identifies a function of the first smart device within the multi-smart device workflow. A processor determines whether an alternative smart device can replace the first smart device within the multi-smart device workflow. Responsive to resolution of the at least one of the security vulnerability and the anomaly, a processor re-establishes the workflow with the first smart device.

Status:
Application
Type:

Utility

Filling date:

10 Jul 2020

Issue date:

13 Jan 2022