G06F2221/2111

Controlling distribution of resources on a network

Disclosed are various embodiments for controlling a distribution of resources on a network. In one example, among others, a system is configured to transmit a request to access a plurality of resources at a distribution service and receive the plurality of resources and a plurality of location rules. The system is also configured to determine an authorized location and an authorized perimeter area based on the plurality of location rules. The authorized location and the authorized perimeter area are determined to have different access rights to the plurality of resources. The system is further configured to determine a location of the computing device and grant access to a resource based on the location of the computing device with respect to the authorization location or the authorized perimeter.

Mobile device service systems and methods using device orientation information
11483352 · 2022-10-25 · ·

This disclosure relates to, among other things, systems and methods for managing the communication of messages between devices using a service system operating as a trusted intermediary. Information indicative of device location and/or orientation may be communicated to the service system, which may use the information to determine whether a transmitting device is oriented and/or otherwise pointed in the direction of an intended receiving device. The trusted service may enforce policy articulated by the receiving device in connection with the communication of a message from the transmitting device to the intended receiving device.

Security Enabled False Desktop Computing Environment
20230080347 · 2023-03-16 ·

A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system.

Terminal device, personal authentication system and personal authentication method
11483713 · 2022-10-25 · ·

A technology which is highly safe and furthermore highly convenient in personal authentications via a mobile terminal is provided. A terminal device 200 of the present invention includes: a position determining section 271 that determines a position of the terminal device 200 at predetermined time intervals, and accumulates the position as position information; a movement history generating section 272 that generates a movement history by using the position information accumulated in a predetermined period, and stores the movement history as movement history information; a registration processing section 276 that transmits, for registration, the movement history information to a personal authentication apparatus; and an authentication requesting section 279 that makes an authentication request to the personal authentication apparatus 310 by using the movement history information stored after the transmission by the registration processing section 276 to the personal authentication apparatus 310.

METHODS AND SYSTEMS FOR MANAGING USER DATA PRIVACY

A method may include storing, using a data management application on a user device, personal data that is associated with a user and a first data variable. The method may further include obtaining, from a requesting application and by the data management application, a data request for a second data variable. The method may further include determining, by the data management application, whether the first data variable associated with the personal data matches the second data variable associated with the data request. The method may further include transmitting, by the data management application and in response to determining that the first data variable matches the second data variable, the personal data to various intermediary nodes. One intermediary node among the intermediary nodes may transmit the personal data to the requesting application using a distributed ledger.

SMART DEVICE ACCESS SYSTEM
20230081318 · 2023-03-16 ·

Methods and systems for managing access to smart devices. One aspect is a method for providing access to at least one smart device, the method comprising identifying the at least one smart device that is in data communication with a smart device hub, storing user level access permissions including a global user level, communicating with a user device, the user device being associated with a stored user level access permission, the global user level allowing the user device to remotely connect to the smart device hub, determining the user level access permission for the user device, determining whether the user device has permission to access the at least one smart device based on the user level access permission, wherein to access the at least one smart device requires the global user level, and providing access to the at least one smart device to the user device.

METHOD, APPARATUS, AND SYSTEM FOR WIRELESS VITAL MONITORING USING HIGH FREQUENCY SIGNALS

Methods, apparatus and systems for wireless vital sign monitoring are described. In one example, a described system comprises: a transmitter configured to transmit a wireless signal through a wireless channel of a venue; a receiver configured to receive the wireless signal through the wireless channel that is being impacted by an object motion of an object in the venue; and a processor. At least one of the transmitter or the receiver comprises an array of antennas used to transmit or receive the wireless signal. The object motion comprises at least one non-periodic body motion of the object and at least one periodic vital-sign motion of the object. The processor is configured for: segmenting space around the venue into a plurality of sectors based on a beamforming and the received wireless signal, wherein each sector of the plurality of sectors is associated with a spatial direction relative to the array of antennas, obtaining a plurality of time series of channel information (CI) of the wireless channel based on the beamforming, wherein each time series of CI (TSCI) of the plurality of TSCI is associated with a respective sector of the plurality of sectors, isolating the object motion of the object in the plurality of TSCI to generate a plurality of isolated TSCI, compensating for the at least one non-periodic body motion of the object in the plurality of isolated TSCI to generate a plurality of compensated TSCI, and monitoring the at least one periodic vital-sign motion of the object based on the plurality of compensated TSCI.

Systems and methods for leveraging global positioning repeaters to locate devices and to obfuscate device location
11480687 · 2022-10-25 · ·

A method for using global positioning system (GPS) repeaters to obfuscate a location of a mobile device operating in an area of a communications network, the communication network including a monitoring system, includes receiving an indication that the mobile device enters the communications network; requesting a GPS location from the mobile device; receiving repeated GPS information from the mobile device; calculating a obfuscated location of the mobile device; mapping the obfuscated location of the mobile device to a table of defined locations to produce an actual mobile device location; and reporting the actual location of the mobile device.

Device management and security through a distributed ledger system

Techniques are described for managing internet-of-things (IoT) devices, such as managing the storage of data generated by the IoT devices, managing the access, to the data, by users, processes, and/or other entities, managing command and control of the devices, and so forth. In some implementations, an IoT platform is provided for IoT device management, and the IoT platform can be agnostic with respect to providers. For example, the IoT platform may provide one or more common interfaces that enable communications with IoT devices that are manufactured by different device providers. In some implementations, a distributed ledger system (DLS) is employed to facilitate IoT device management. For example, the DLS can act as a gateway and/or overall interface to control access of users, processes, devices, IoT device providers, and/or other entities to the IoT devices and/or to an IoT platform.

System and method for transferring states between electronic devices
11606414 · 2023-03-14 · ·

In some examples, a system comprises a memory device for storing instructions and a processor which executes instructions causing the system to perform operations comprising receiving an instruction to transfer a state of a first device to a second device, and packaging information relating to the state of the first device in a file. The packaging of the information relating to the state of the first device includes recording each application executing on the first device in a list maintained in the file, and transferring the file containing information relating to the state of the first device to the second device, either directly or indirectly based on an availability of connections between the first device and the second device. The file, when processed by the second device, causes the second device to reproduce the state of the first device. In some example, reproducing the state of the first device includes the second device downloading, from one or more of the locations, one or more of the applications.