Patent classifications
G06F21/88
TAMPER DETECTION SYSTEMS AND METHODS FOR ELECTRONIC DEVICES CARRIED BY MOBILE EQUIPMENT
Tamper detection systems and methods for electronic devices carried by mobile equipment are disclosed. According to an aspect, a system includes an electronic device and a first sensor attached to the electronic device for detecting motion of the electronic device. The system includes a second sensor configured to detect motion of the mobile equipment to which the electronic device is attached. A tamper detection module receives data from the first sensor that indicates the detected motion of the electronic device. The tamper detection module receives data from the second sensor that indicates the detected motion of the mobile equipment. Further, the tamper detection module determines a difference between the detected motion of the electronic device and the detected motion of the mobile equipment. The tamper detection module determines a tamper condition for the electronic device based on the determined difference. A security action in response to determining the tamper condition.
System for loss prevention and recovery of portable electronic devices
A system for loss prevention and loss recovery of portable electronic devices. The system includes a server administered by an administrator, a software application executable on a portable electronic device in communication with the server, a unique registration identifier associated with the portable electronic device, and a distance tracking device. The association between the portable electronic device and the unique registration identifier is stored on the server. The software application is configured to connect to the distance tracking device. The distance tracking device is configured to provide a notification when the distance tracking device is further than a predetermined boundary from the portable electronic device. When the unique registration identifier is entered at a website associated with the server, return delivery information is provided.
System for loss prevention and recovery of portable electronic devices
A system for loss prevention and loss recovery of portable electronic devices. The system includes a server administered by an administrator, a software application executable on a portable electronic device in communication with the server, a unique registration identifier associated with the portable electronic device, and a distance tracking device. The association between the portable electronic device and the unique registration identifier is stored on the server. The software application is configured to connect to the distance tracking device. The distance tracking device is configured to provide a notification when the distance tracking device is further than a predetermined boundary from the portable electronic device. When the unique registration identifier is entered at a website associated with the server, return delivery information is provided.
Unified multi-platform system for data privacy
A data manager in an enterprise provides data management of users' personal data, which is used by enterprise applications to support operations in the enterprise. The data manager obtains personal data from the enterprise applications via the use of corresponding connector modules. The data manager communicates with each connector module, which then communicates with its corresponding enterprise application to obtain personal data used by that application. The data manager can also communicate with a central database that can store personal data used by the enterprise applications. The central database can serve as a central store of personal data for the enterprise applications.
Unified multi-platform system for data privacy
A data manager in an enterprise provides data management of users' personal data, which is used by enterprise applications to support operations in the enterprise. The data manager obtains personal data from the enterprise applications via the use of corresponding connector modules. The data manager communicates with each connector module, which then communicates with its corresponding enterprise application to obtain personal data used by that application. The data manager can also communicate with a central database that can store personal data used by the enterprise applications. The central database can serve as a central store of personal data for the enterprise applications.
Management of securable computing resources
A system is provided. The system includes a computing resource, a cable insertable into the computing resource, a locking element and a controller. The locking element is configured to assume a locked condition in which the cable is locked to the computing resource or prevented from insertion into the computing resource and an unlocked condition in which the cable is removable from the computing resource and permitted to be inserted into the computing resource. The controller is configured to define rules for users. The rules are associated with respective identifiers (IDs) of each of the users and establish criteria associated with each user for causing the locking element to assume one of the locked and unlocked conditions.
Working machine management system and working machine
A working machine management system includes a working machine having a prime mover and a control unit and a key device which is detachable from the working machine and is used for operating the working machine. The key device stores first authentication information for identifying a drivable working machine and second authentication information necessary for the prime mover to continuously operate. When the key device is attached to the working machine, the control unit confirms validity of the key device based on the first authentication information, compares input information from the outside with the second authentication information to determine whether the prime mover can be operated if the key device is valid, and controls operation of the prime mover according to the determination result.
Multi-purpose smart card with user trusted bond
The present disclosure relates a new generation “smart card” designed to create a severable invisible “bond” between the cardholder and the smart card itself where this trusted bond relationship is used to enhance and simplify the authentication process and during the use of the multi-purpose smart card. This new smart card is initiated and connected to a specific user using biometric information added to the card and the user using biometric information connects via a trusted bond with the card by pairing the biometric information which can be severed in one of multiple ways. The trusted bond with the smart card can be broken in one of multiple ways including disconnection from a network, distancing from the user, impact accelerometers, outside parameters, etc. The multi-function smart card also uses this established trusted bond with the user to simplify the authentication of the user for use of the card in encrypted computer network, ground security, or other retail and payment function.
Device Location Finding
Embodiments for a device locator application are described. In an embodiment, one or more inertial displacement measurement values may be received using the inertial sensor and received camera sensor data, a trajectory based on the one or more inertial displacement measurement values may be determined, a beacon signal from a target wireless device and determine at least one signal strength value from the beacon signal may be received, at least one proximity value to the target wireless device may be estimated based on the at least one signal strength value corresponding to at least one position along the trajectory, and an indicator of the at least one proximity value to the target wireless device may be presented along the trajectory in a user interface.
Electronic apparatus
An electronic device includes a first unit having an input part and a second unit having a display. The first unit and the second unit are detachably coupled, and the first unit includes a socket capable of housing a predetermined side of the second unit. A first insertion hole, into which a security member can be inserted, is provided on a side of the socket, and a second insertion hole, into which the security member can be inserted, is provided on a side of the second unit. The first insertion hole of the socket is provided on an upper part of the socket, and the second insertion hole of the second unit is provided on a lower part of the second unit.