G08B23/00

MONITORING SYSTEM, MONITORING METHOD, AND STORAGE MEDIUM
20230051197 · 2023-02-16 · ·

A plurality of hierarchy information management devices include a first hierarchy information management unit managing first hierarchy information in which information on instruments is represented in a hierarchy structure, and each hierarchy information management device manages the first hierarchy information of a different one of the instruments. A monitoring device includes: a second hierarchy information management unit generating second hierarchy information based on a plurality of different pieces of the first hierarchy information acquired from the hierarchy information management devices, the second hierarchy information being hierarchy information in which the first hierarchy information is connected in a hierarchy structure; a display unit displaying information; and a display processing unit performing a process of switching between a plurality of different monitoring screens for display on the display unit, the different monitoring screens corresponding to different layers in the second hierarchy information and showing the operating state of the monitoring targets.

Information security system and method for anomaly and security threat detection
11556637 · 2023-01-17 · ·

A system for detecting security threats in a computing device receives a first set of signals from components of the computing device. The first set of signals includes intercommunication electrical signals between the components of the computing device and electromagnetic radiation signals propagated from the components of the computing device. The system extracts baseline features from the first set of signals. The baseline features represent a unique electrical signature of the computing device. The system extracts test features from a second set of signals received from the component of the system. The system determines whether there is a deviation between the test features and baseline features. If the system detects the deviation, the system determines that the computing device is associated with a particular anomaly that makes the computing device vulnerable to unauthorized access.

Method and apparatus for automatically setting alarms and notifications

A processor-based personal electronic device (such as a smartphone) is programmed to automatically respond to data sent by various sensors from which the user's activity may be inferred. One or more alarms on the device may be temporarily disabled when sensor data indicates that the user is asleep. One or more of the sensors may be worn by the user and remote from the device. A wireless communication link may be used by the device to obtain remote sensor data. Data from on-board sensors in the device—such as motion sensors, location sensors, ambient light sensors, and the like—may also be used to deduce the user's current activity. User data (such as calendar entries) may also be used to determine likely user activity and set alarms accordingly. Biometric data from a second, nearby person may also be used to automatically select certain alarm modes on a first person's device.

Mobile Telephone Dog Training Tool and Method
20180000045 · 2018-01-04 ·

A mobile telephone adapts to use as a gundog training tool by interfacing with a dog collar using a wireless communication device, such as a WWAN text or IP interface, a WLAN interface or a radio transceiver that couples to the mobile telephone and is accessible to a training application running on the mobile telephone. The dog collar includes a GPS receiver to provide position information to the mobile telephone and a shock device to provide training stimulus to the dog. A wireless headset interfaces with the mobile telephone to provide audible indications of position to an end user, such as a dog point and tone indicators of directions to the dog. A wireless handset interfaces with the mobile telephone to accept inputs for application to the collar, such as training stimulus.

Mobile Telephone Dog Training Tool and Method
20180000045 · 2018-01-04 ·

A mobile telephone adapts to use as a gundog training tool by interfacing with a dog collar using a wireless communication device, such as a WWAN text or IP interface, a WLAN interface or a radio transceiver that couples to the mobile telephone and is accessible to a training application running on the mobile telephone. The dog collar includes a GPS receiver to provide position information to the mobile telephone and a shock device to provide training stimulus to the dog. A wireless headset interfaces with the mobile telephone to provide audible indications of position to an end user, such as a dog point and tone indicators of directions to the dog. A wireless handset interfaces with the mobile telephone to accept inputs for application to the collar, such as training stimulus.

Method, device, and system for influencing at least one driver assistance system of a motor vehicle

The present disclosure relates to a method for controlling at least one drive assistance system of a motor vehicle, a device for carrying out the steps of this method and a system including such a device. The disclosure also relates to a motor vehicle including such a device or such a system.

System, method, and computer program product for user network activity anomaly detection

Described are a system, method, and computer program product for user network activity anomaly detection. The method includes receiving network resource data associated with network resource activity of a plurality of users and generating a plurality of layers of a multilayer graph from the network resource data. Each layer of the plurality of layers may include a plurality of nodes, which are associated with users, connected by a plurality of edges, which are representative of node interdependency. The method also includes generating a plurality of adjacency matrices from the plurality of layers and generating a merged single layer graph based on a weighted sum of the plurality of adjacency matrices. The method further includes generating anomaly scores for each node in the merged single layer graph and determining a set of anomalous users based on the anomaly scores.

Device, method, and recording medium
11568719 · 2023-01-31 · ·

After an installation of an apparatus, although a state confirmation is necessary, if a display having a high display capability is mounted to the apparatus to facilitate checking, the apparatus becomes large. Further, although it is considered that a terminal such as a personal computer is connected to an apparatus to display state information, when the apparatus is installed in a high place or a narrow gap, the connection is difficult. An apparatus is provided which includes a storage unit that stores state information on a plurality of types of states, a switching unit that switches a to-be-output state from among the plurality of types of states in response to receiving a switching operation by a user, an identification information output unit that outputs a first indication for identifying a type of a to-be-output state, and a state information output unit that outputs state information on a to-be-output state.

Automated malware monitoring and data extraction
11568053 · 2023-01-31 · ·

A malware monitoring method includes: obtaining a malware sample; extracting operational parameters corresponding to the malware sample; configuring an emulator application corresponding to the malware sample using the operational parameters; executing a plurality of instances of the configured emulator application; collecting output data from each of the plurality of instances; and generating indicators of compromise (IOCs) based on the collected output data.

ABNORMALITY DETERMINATION SYSTEM AND POWER GENERATION SYSTEM
20230231517 · 2023-07-20 ·

An abnormality determination system includes a power generation amount measurement unit that measures a power generation amount of the photovoltaic facility; a data acquisition unit that acquires data of a solar radiation amount; a calculation unit that divides a summed value of the power generation amount per day by a summed value of the solar radiation amount per day to calculates a division value; and a data accumulation unit that accumulates a combination of the power generation amount and the solar radiation amount, or the division value, and is configured to determine that there is an abnormality based on a slope of the division values.