G06F2221/2111

TECHNOLOGIES FOR MANAGING COMPROMISED SENSORS IN VIRTUALIZED ENVIRONMENTS

Systems, methods, and computer-readable media for managing compromised sensors in multi-tiered virtualized environments. In some embodiments, a system can receive, from a first capturing agent deployed in a virtualization layer of a first device, data reports generated based on traffic captured by the first capturing agent. The system can also receive, from a second capturing agent deployed in a hardware layer of a second device, data reports generated based on traffic captured by the second capturing agent. Based on the data reports, the system can determine characteristics of the traffic captured by the first capturing agent and the second capturing agent. The system can then compare the characteristics to determine a multi-layer difference in traffic characteristics. Based on the multi-layer difference in traffic characteristics, the system can determine that the first capturing agent or the second capturing agent is in a faulty state.

METHOD FOR AUTOMATICALLY UNBLOCKING OR BLOCKING A COMPUTER-SUPPORTED MEDICAL DEVICE
20230064667 · 2023-03-02 ·

The invention relates to a method for automatically blocking and/or unblocking a computer-supported medical device in a system, said system comprising the computer-supported medical device and a mobile terminal, wherein the mobile terminal comprises a first wireless communication device for wirelessly transmitting and receiving data and wherein mobile application software can be executed by means of the mobile terminal, wherein the medical device comprises a device computer and wherein the device computer comprises a second wireless communication device for wirelessly transmitting and receiving data, wherein driver software can be executed on the device computer, which can establish a wireless communication connection to the first communication device of the mobile terminal by means of the second communication device of the medical device, wherein the medical device is automatically shifted from a blocked state into an unblocked state, if the first communication device of the mobile terminal has established a wireless connection with the second communication device of the medical device and the signal strength of the signal of the first communication device of the mobile terminal, received by the second communication device of the medical device, exceeds a predetermined first threshold value and/or the medical device is automatically shifted from an unblocked state into a blocked state, if the first communication device of the mobile terminal has established a wireless connection with the second communication device of the medical device and the signal strength of the signal of the first communication device of the mobile terminal, received by the communication device of the medical device, falls below a predetermined second threshold value and/or if the wireless connection is interrupted for longer than a predetermined first time interval.

INITIALIZATION GEO-LOCKING SYSTEM
20230124661 · 2023-04-20 ·

An initialization geo-locking system includes a chassis housing a location determination subsystem and an initialization management subsystem. During an initialization process that begins in response to receiving initialization power, the initialization management system determines that geo-locking is activated and, in response, causes power to be provided to the location determination subsystem and then subsequently identifies a first current location determined by the location determination subsystem. The initialization management subsystem then determines whether the first current location determined by the location determination subsystem corresponds to an authorized initialization location stored in the initialization management subsystem and, if so, halts the initialization process while, if not, allows the initialization process to complete.

TARGETED VENUE BASED MESSAGE AND COMMUNICATION DISTRIBUTION BASED ON PROXIMITY DATA
20230061236 · 2023-03-02 ·

Disclosed herein are systems and methods for immunity data creation and immunity monitoring (e.g., management, maintenance, etc.). A user may upload immunity and redaction data. A community of other users may verify the uploaded data. A venue may comprise a target immunity level and an actual immunity level. Combining the verified uploaded data with the actual immunity level may yield a new actual immunity level. The user may be allowed to enter the venue if the new actual immunity level is at or above the target immunity level.

GEOFENCE TRACKING WITH DEVICE LOCATION PRIVACY
20230069458 · 2023-03-02 · ·

A system for providing a geofence service is disclosed. The geofence service receives an encrypted geospatial index for a specified geofence based on application of a hash function to respective ones of a plurality of locations for the specified geofence in accordance with a secret key that is unknown to the geofence service. The geofence service stores the encrypted geospatial index to a data store according to a geofence identifier for the specified geofence. The geofence service receives an encrypted device location identifier generated based on application of the hash function to a representation of a current location of a user device in accordance with the secret key. The geofence service determines whether the user device is located in a location of the plurality of locations based on a query of the encrypted geospatial index according to the encrypted device location identifier.

Multiple devices for updating repositories

Provided is a method including obtaining a first set of queries from an application of a first device for a set of values of a record, determining a numeric boundary based on the set of value, and providing a UI to the first device, where the UI including a UI element displaying the numeric boundary. The method includes obtaining an interface-selected value, obtaining devices using a second set of queries, and obtaining a first location of the first device and a plurality of locations associated with the devices. The process includes selecting a second device of the devices based on distances between the first location and the plurality of locations. The method includes determining whether an authentication value is received from the second device and updating a field of the record based on the interface-selected value in response to receiving the authentication value from the second device.

Time and location controlled centralized access management system

A system for and method of automatically providing access credentials to employees based upon the time and location of the employee when the request was made are provided. The system and method also control the provision of access credentials to an employee by using the employment status and role of the employee to determine whether the employee is authorized to receive the requested access credentials.

Data interaction platforms utilizing dynamic relational awareness
11663533 · 2023-05-30 · ·

There is a need for more effective and efficient data modeling and/or data visualization solutions. This need can be addressed by, for example, solutions for performing data modeling and/or data visualization in an effective and efficient manner. In one example, solutions for generating a data model with dynamic relational awareness are disclosed. In another example, solutions for processing data retrieval queries using data models with dynamic relational awareness are disclosed. In yet another example, solutions for generating data visualizations using data models with dynamic relational awareness are disclosed. In a further example, solutions for integrating external data objects into data models with dynamic relational awareness are disclosed.

Application-specific security

Embodiments for enabling or disabling application features according to application-specific security settings are described. The application-specific security settings can control when particular security levels, corresponding to authentication procedures, are required. The security levels can correspond to authentication procedures such as requiring no password, only requiring a PIN, allowing authentication by biometrics, or requiring a password. The application-specific security settings can control security levels based on a variety of circumstances such as setting particular security levels for particular locations, setting different security levels based on time since last device use, etc. In various implementations, the security levels can be mapped to application features to enable or disable.

Identity verification system and method for gathering, identifying, authenticating, registering, monitoring, tracking, analyzing, storing, and commercially distributing dynamic biometric markers and personal data via electronic means
11663319 · 2023-05-30 ·

An interactive identity verification system for gathering, identifying, authenticating and registering biometric data of a consumer verified through government agencies while monitoring, tracking, analyzing, storing and distributing dynamic biometric data to ensure access to the secured system remains authorized via monitoring of consumer data and to control authorized access to participating computer systems and programs. Consumer identity is verified with markers gathered from biometric detection and collection devices provided within the system, correlated with unique personal information and geo-location coordinates allowing authorized access to a secure computer system. Dynamic monitoring of consumer biometric data is required to guarantee online identity verification while operating under an alias or avatar to maintain public anonymity, participate in marketing incentive programs and increase security. The system provides for a registered consumer to use multiple registered computer devices while the central repository interfaces dynamically with specific markets to distribute stored data within the system.