17. User Experience in the Connected Home
Smart Phone vs Light Switch.
1. Find your phone
2. Turn it on
3. Unlock it (passcode)
4. Locate the “lights” app
5. Turn light on
6. Put your phone away
1. Walk up to the light switch
2. Flip the switch
3. Go back to bed
18. User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models are possible.
19. User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models are possible.
20. User Experience in the Connected Home
1) The smartphone is not the right answer.
2) If it’s not broken, don’t fix it.
3) New interaction models must be very low friction.
24. IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
25. IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
26. IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
27. IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
28. IoT and Security
IoT devices are harder to secure.
-Limited hardware resources
-Intermittent or no cloud connectivity
-3rd Party Platform Integrations
-Potentially multiple RF access points (i.e. Wifi,
BLE, Zigbee, etc.)
29. 2 Common IoT Device Vulnerabilities
1. Open BLE/LAN APIs
Interacting with a device over the LAN or BLE
should require authentication. Many devices
allow unrestricted access via the same WiFi
network or over BLE.
All access points should be secured.
30. 2 Common IoT Device Vulnerabilities
2. Unrestricted ‘Reset To Factory’
Devices should be protected against physical
theft or access. Changes to the network
connection or re-assignment to another user
account should be restricted.
31. IoT in the Cloud
Users are very sensitive about
what information you store
about them.
This makes sense, you are in their home.
Don’t be creepy.