Patent classifications
G06F2221/2111
Securing displayed data on computing devices
Techniques for securing displayed data on computing devices are disclosed. One example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. In response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. In response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked.
STRUCTURE-BASED ACCESS CONTROL
The present disclosure provides systems and methods that perform structure-based access control. In particular, rather than relying upon a user-specific credential scheme, which can require manual sharing of user-specific credentials and/or switching between the multiple accounts to access the particular devices, applications, or services associated with such accounts, the systems and methods of the present disclosure facilitate user credentials to be inherited by or otherwise assigned to a structure identifier associated with a structure (e.g., a home in which the user resides), thereby generating a set of structure credentials. This enables other users in the structure, who may be part of a collaborative user group, to access devices, applications, and/or services using the structure credentials.
SYSTEM AND METHOD FOR DETECTING LATERAL MOVEMENT AND DATA EXFILTRATION
A system configured to detect a threat activity on a network. The system including a digital device configured to detect a first order indicator of compromise on a network, detect a second order indicator of compromise on the network, generate a risk score based on correlating said first order indicator of compromise on the network with the second order indicator of compromise on said network, and generate at least one incident alert based on comparing the risk score to a threshold.
Systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s)
Exemplary embodiments are disclosed of systems and methods for monitoring for and lowering the risk of addiction-related or restriction violation-related behavior(s).
Systems and Methods for Managing Real Estate Titles and Permissions
Methods and systems for managing real estate titles and permissions include using a key to identify titles and/or permissions. The key is preferably operable to control operations of electronic devices within geographic boundaries, with the geographic boundaries preferably being defined by a geofence and/or IP-based addressing. In certain embodiments, a system is linked to real property records to assign the key to the owner of record. Like other property rights, this virtual right-to-control electronic devices while located in a certain space may be sold outright, leased, rented, partitioned or otherwise conveyed to others.
System and method for processing computer inputs over a data communication network
Various computers will communicate messages back and forth over a communication network. These communications may exchange various information. In one aspect, an apparatus for communicating data over a communication network may comprise a computer processor, a receiver, and a memory. The computer processor may generate a request for transmission to a first server via the communication network. The request may include a data inquiry for data about an authorized user of a communication device. The computer processor may also generate a communication message for transmission to the authorized user with a prompt to provide user data via the communication device. The receiver may receive a response from the first server and user data from the communication device. The computer processor may further format the user data and generate a dynamic value based on the formatted response for display.
Decentralized virtual trustless database for access control
Described are systems and techniques for leveraging a virtual distributed trustless database using access-enabling codes. The computations use private codes. Each computation includes the information from all previous computations so that a chain of computations is maintained and controlled. A central system insures that dual computations do not occur.
DATA PRODUCT GENERATION AND PRODUCTION BASED ON DYNAMICALLY SELECTED/OBFUSCATED VEHICLE LOCATION
A system configured to, and method of, generating and providing a data product using data supplied by a multitude of vehicles that includes receiving a plurality of geographical locations; carrying out a geographical location obfuscation process in order to obtain processed connected vehicle data, wherein the geographical location obfuscation process includes: (i) identifying a road segment based on the received geographical location; (ii) determining an associated road type of the road segment; (iii) determining whether to obfuscate the received geographical location based at least in part on the associated road type; and (iv) when it is determined to obfuscate the received geographical location, obfuscating the received geographical location so as to obtain an obfuscated geographical location, wherein the obfuscated geographical location is included in the processed connected vehicle data; generating the data product using the processed connected vehicle data; and providing the data product to a third party.
Automated association of media with occurrence records
A system, method and program storage device are provided for automatically associating evidence recorded by a plurality of cameras with a discrete occurrence, including: receiving occurrence data pertaining to the discrete occurrence and storing at least a portion of the occurrence data in an occurrence record; receiving first evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a first camera of the plurality of cameras and storing it in an evidence record; receiving second evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a second camera of the plurality of cameras and storing it in the evidence record; automatically associating information stored in the evidence record with information stored in the occurrence record based on a correspondence of at least two criteria including a first criterion of time; identifying, based on the automatic association, a first image data portion of the evidence recorded by the first camera that is related to the discrete occurrence while excluding a second image data portion of the evidence recorded by the first camera that is unrelated to the discrete occurrence; and identifying, based on the automatic association, a third image data portion of the evidence recorded by the second camera that is related to the discrete occurrence while excluding a fourth image data portion of the evidence recorded by the second camera that is unrelated to the discrete occurrence.
Authentication device, authentication system, authentication method, and program
An authentication device includes: a wearing position determination unit that determines a wearing position, the wearing position being a position at which a wearable article comprising a sensor is being worn on a body; and an authentication unit that performs authentication by using biometric information of the body, the biometric information being detected by the sensor at the wearing position.