Patent classifications
G06F2221/2111
GLOBAL REGISTRATION SYSTEM FOR AERIAL VEHICLES
Systems and methods for vehicle registration are disclosed. A server computer and at least one database are constructed and configured for network communication with at least one vehicle. The at least one vehicle transmits a registration request to the server computer. The server computer assigns a unique registration ID for the at least one vehicle. The at least one database comprises a geofence database storing information of a multiplicity of registered geofences. Each of the multiplicity of registered geofences comprises a plurality of geographic designators defined by a plurality of unique Internet Protocol version 6 (IPv6) addresses. One of the plurality of unique IPv6 addresses is encoded as a unique identifier for each of the multiplicity of registered geofences. The server computer caches the information of the multiplicity of registered geofences on the at least one vehicle.
System and method for access control using network verification
A system for controlling access includes a computing device, configured to: determine a first identifier associated with a first access point being used by the computing device to access a network; determine first access control data associated with the first identifier and a first application executing on the computing device; and control access to data over the network by the first application based on the first access control data.
Preserving authentication under item change
Apparatuses and methods associated with preserving authentication under item change are disclosed herein. In embodiments, acquiring digital image data of an image of at least a portion of a target physical object; extracting features from the image data to form a digital fingerprint; querying the database system to seek a matching record based on the digital fingerprint; based on an amount of difference between the digital fingerprint and a stored digital fingerprint of the database, update the database system to output a new indication of a new match to the physical object for any new samples that are not matchable to the stored digital fingerprint within a first predetermined similarity threshold provided the new samples are matchable to the digital fingerprint within a second predetermined similarity threshold. Other embodiments may be disclosed or claimed.
Apparatus and method to identify a user based on sound data and location information
An apparatus has circuitry which determines a location of a user, based on sound data representing speech of the user, and identifies the user based on the determined location of the user and user identification information and location information received from a mobile device.
Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with delayed block posting protocol
A distributed transaction and data storage platform including a distributed notary ledger or blockchain and one or more individual user micro-identifier chains that together enable the secure effectuation and recordation of one or more transactions, and/or storage of data in an automated, real-time, zero-trust, globally data law and privacy law centric manner while maintaining transaction party confidentiality and preventing chain poisoning.
DEDUPLICATED DATA DISTRIBUTION TECHNIQUES
In connection with a data distribution architecture, client-side “deduplication” techniques may be utilized for data transfers occurring among various file system nodes. In some examples, these deduplication techniques involve fingerprinting file system elements that are being shared and transferred, and dividing each file into separate units referred to as “blocks” or “chunks.” These separate units may be used for independently rebuilding a file from local and remote collections, storage locations, or sources. The deduplication techniques may be applied to data transfers to prevent unnecessary data transfers, and to reduce the amount of bandwidth, processing power, and memory used to synchronize and transfer data among the file system nodes. The described deduplication concepts may also be applied for purposes of efficient file replication, data transfers, and file system events occurring within and among networks and file system nodes.
Electronic devices, methods, and systems for temporarily precluding sharing of media content to protect user privacy
An electronic device includes one or more sensors capturing media content while the electronic device is situated at a media content capture location. A user interface receives user input requesting transmission of the media content to another electronic device at a user input reception location. A location detector determines whether the media content capture location and the user input reception location are substantially different locations. One or more processors at least temporarily preclude, in response to the user input, the transmission of the media content to the other electronic device when the location detector determines that the media content capture location and the user input reception location are substantially different locations.
CONTROLLING ACCESS TO SECURED DATA VIA TIMED FILTERING OF DATA
According to certain implementations, an access control system controls access to secured data that is stored on a secured source. A requestor system may request information representing the secured data. The access control system receives the secured data from the secured source, and selects a portion of the secured data based on a lens including a filter criteria or a modification instruction. Adjusted data may be generated based on a modification of the selected portion of data, where the modification is based on the lens. The access control system provides the adjusted data to the requestor system via an access interface. In some cases, upon completion of a time period, the access control system prevents the requestor system from accessing the adjusted data, by disabling the access interface used to access the adjusted data. The adjusted data may be deleted from the access control system.
INFECTION RISK ASSESSMENT METHOD FOR AN EPIDEMIC AND PANDEMIC
A method, system, and/or apparatus for automatically monitoring for possible infection or other physical health concerns, such as from Covid-19. The method or implementing software application uses or relies upon location information available on the mobile device from any source, such as cell phone usage and/or other device applications. The method and system automatically uses and/or learns user location and activity patterns and determines and infection risk that can be communicated as a warning to community members.
Verification request authentication machine
A machine trains an artificial intelligence engine to facilitate authentication of a request to verify a user. The machine accesses a reference set of obfuscated geolocations generated from actual geolocations from which a device submitted requests to verify the user. The machine groups the obfuscated geolocations into geographical clusters based on a predetermined cluster radius value and calculates a corresponding representative geolocation for each geographical cluster and a corresponding variance distance from the representative geolocation for each geographical cluster. The machine then generates a reference location score based on the representative geolocations of the geographical clusters and on the variance distances of the geographical clusters. The machine trains an artificial intelligence engine to output that reference location score in response to the reference set being input thereto. The trained artificial intelligence engine may then be provided to one or more devices.