Patent classifications
G06F21/88
Continuous multifactor authentication system integration with corporate security systems
Disclosed herein are systems, methods, and computer-readable media for increasing security of devices that leverages an integration of an authentication system with at least one corporate service. In one aspect, a request is received from a user device to authenticate a person as a particular user by the authentication system. A photo of the person attempting to be authenticated as the particular user is captured. Nodal points are mapped to the captured photo of the person attempting to be authenticated, and the nodal points from the photo are compared against a reference model for facial recognition of the particular user. It is then determined whether the nodal points match the reference model for the particular user. The present technology also includes sending a command to the user device to send data to identify the person, and/or a location of the user device.
Device locator disable authentication
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
Device locator disable authentication
A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.
Method and apparatus for erasing security-relevant information in a device
Provided is a method for erasing security-relevant information in a device, having the method steps of: ascertaining at least one movement parameter of the device over time, monitoring the ascertained movement parameters over time on the basis of at least one prescribed movement pattern, and triggering an erase process for the security-relevant information if the ascertained movement parameter over time is consistent with the at least one prescribed movement pattern. An apparatus and a computer program product for carrying out the method to ensure that security-relevant data of the device are erased reliably and completely even in the event of an accident or another unforeseen event is also provided.
Creating secure data in an oil and gas supply chain
The present invention generally relates to a system and method creating secure data in a gas and oil supply chain. The system creates secure data related to oil and gas assets while traversing an oil and gas supply chain. At least one repository system(s), which collects secure data generated by capturing information using a secure observer device, sends the secure data to a gateway which is a part of a global management system or an integrity management system to create clustered events. The disclosure also relates to a system and method for managing and controlling data between entities in an oil and gas asset supply chain, and in particular to an excise tax management system and method to identify and reconcile tax filings, production volumes and operational reports.
Creating secure data in an oil and gas supply chain
The present invention generally relates to a system and method creating secure data in a gas and oil supply chain. The system creates secure data related to oil and gas assets while traversing an oil and gas supply chain. At least one repository system(s), which collects secure data generated by capturing information using a secure observer device, sends the secure data to a gateway which is a part of a global management system or an integrity management system to create clustered events. The disclosure also relates to a system and method for managing and controlling data between entities in an oil and gas asset supply chain, and in particular to an excise tax management system and method to identify and reconcile tax filings, production volumes and operational reports.
Storage enclosures
In one example, a physical storage enclosure can include a storage area to enclose a device, a locking mechanism to prevent removal of the device from the storage area, a logical configuration system coupled to the device within the storage area, wherein the logical configuration system includes instructions to identify the device within the storage area and alter instructions associated with the device within the storage area, a hardware logistic system coupled to the locking mechanism to activate and deactivate the locking mechanism, and a firewall to restrict communication between the logical configuration system and the hardware logistic system.
Communications module for technology asset connectivity
A wireless communication module of a technology asset device is operable to derive power from a power source without instruction by the technology asset device to direct power flow from the power source to the wireless communication module. The wireless communication module can connect to a wireless network and receive from an asset management system an instruction regarding a responsive action to be performed by the wireless communication device that relates to a condition.
Automatic device zeroization
Systems, apparatuses, and methods are described for zeroization of a computing device based on biometric information and vitality information. A computing device may store information associated with a user. The computing device may request biometric information and vitality information from one or more sensing devices. The computing device may determine, based on the requested biometric information and the requested vitality information, whether to zeroize the computing device.
Systematic integration via an intrusion detection device
A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.