G06F2221/2111

HUMAN-COMPUTER INTERACTION INTERFACE CONTROL METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM

A human-computer interaction interface control method, apparatus, device and storage medium. The method includes: generating a virtual information carrier at a mobile terminal in response to a virtual information carrier generation instruction, the virtual information carrier being a virtual carrier for recording information; detecting state data of the mobile terminal, and matching the detected state data and preset target state data of the mobile terminal; determining, in response to the detected state data being matched with the preset target state data, that the mobile terminal is in a preset target state, and acquiring target movement data of the mobile terminal in the preset target state; analyzing the target movement data, and setting an interface control parameter of the mobile terminal automatically based on the target movement data; and controlling a human-computer interaction interface based on the interface control parameter to display the information recorded in the virtual information carrier.

Ultra-wideband location tracking to perform voice input operation

In one aspect, a first device may include at least one processor, an ultra-wideband (UWB) transceiver accessible to the at least one processor, and storage accessible to the at least one processor. The storage may include instructions executable by the at least one processor to receive voice input at the first device and to track a second device using one or more UWB signals received from the second device via the UWB transceiver. The instructions may then be executable to, based on tracking, perform an operation using the voice input.

Device locator disable authentication

A device locator mode or find my device (FMD) mode can allow a lost, stolen, or misplaced mobile device to be located. The FMD mode can be enabled or disabled on a mobile device. Sometimes thieves or unauthorized parties attempt to disable the FMD mode. To prevent this, the mobile device can transmit a unique device identifier to a remote server. The remote server can link the device identifier to a cloud-based user account associated with the user of the mobile device. Before an FMD mode is disabled on the mobile device, before the content or settings can be erased, and/or before a mobile device is permitted to be activated/reactivated, a user of the mobile device can be challenged for the credentials of the cloud-based user account. If valid credentials are provided, FMD can be disabled, the content or settings can be reset, and/or the device can be activated/reactivated.

MULTI-ZONE DISPLAY PRIVACY BASED ON LOCATION AND CONTENT

Examples of multi-zone display privacy based on location and content are described. In some examples, an electronic device may include a location engine to determine a location of the electronic device. The electronic device may also include a privacy engine to determine the location to be an insecure location and to determine that displayed data includes sensitive information. In some examples, the electronic device may include a display controller to enable a privacy mode in a zone of a multiple-zone display screen in response to a determination that the location is an insecure location and the displayed data includes sensitive information.

CENTRALIZED HANDLING OF IC IDENTIFICATION CODES

The invention relates to a method of generating and authenticating guaranteed unique identifier codes (CID) as may be used for identifying and authenticating assets comprising an integrated circuit, the method comprising; generating guaranteed unique identifiers (AID) in a centralized code registration system (3); storing the generated identifiers (AID) within a data storage (31a-31c); associating each identifier (AID) with an unique identification (CID) to be used for identifying an integrated circuit, by applying a bijective algorithm; authenticating an identification code (CID) by inversely calculating an identifier (AID) from an identification code (CID) based on said algorithm.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO DATA RECORDS

A computer-implemented method is disclosed. The method includes: detecting a trigger event associated with a data record; in response to detecting the trigger event, enabling an access control for the data record, the access control defining one or more restrictions on accessing the data record; receiving at least one biometric data capture of a user and a digital form of at least one identification document associated with the user; obtaining verification results representing an identity verification status of the user based on a document verification process using the at least one biometric data capture and the digital form; in response to determining that the verification results satisfy first conditions: verifying user-inputted data based on contents of the at least one identification document; and in response to the verifying, disabling the access control for the data record.

AUTOMATED ASSOCIATION OF MEDIA WITH OCCURRENCE RECORDS
20230222807 · 2023-07-13 ·

A system, method and program storage device are provided for automatically associating evidence recorded by a plurality of cameras with a discrete occurrence, including: receiving occurrence data pertaining to the discrete occurrence and storing at least a portion of the occurrence data in an occurrence record; receiving first evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a first camera of the plurality of cameras and storing it in an evidence record; receiving second evidence data comprising at least a video data portion and a metadata portion of the evidence recorded by a second camera of the plurality of cameras and storing it in the evidence record; automatically associating information stored in the evidence record with information stored in the occurrence record based on a correspondence of at least two criteria including a first criterion of time; identifying, based on the automatic association, a first image data portion of the evidence recorded by the first camera that is related to the discrete occurrence while excluding a second image data portion of the evidence recorded by the first camera that is unrelated to the discrete occurrence; and identifying, based on the automatic association, a third image data portion of the evidence recorded by the second camera that is related to the discrete occurrence while excluding a fourth image data portion of the evidence recorded by the second camera that is unrelated to the discrete occurrence.

TRAVEL IDENTITY TOKENING

A system for leveraging a tokening system to authenticate a traveler while maintaining anonymity of the traveler is provided. The system may include a secure central server configured to store identification data associated with a plurality of users. The system may also include a mobile token application for providing a token identifier representing a user's identification data. The mobile token application may be activated by the central server on a mobile device of the user registered with the central server and stored in a secure storage on the mobile device of the user. The system may also include a travel service provider. The travel service provider may be configured to enable reserving a travel reservation file. The travel service provider may be enabled to retrieve a token identifier from the user's mobile device as representing the identification of the user and verify the token identifier with the central server.

Systems and methods for emergency data integration

A disclosed apparatus obtains emergency data for multiple device types from a plurality of emergency data sources and provides a jurisdictional map view to a plurality of emergency network entities, where each emergency network entity corresponds to a given geographic boundary. The jurisdictional map view corresponds to a respective emergency network entity's geographic boundary. The apparatus determines portions of the emergency data corresponding to emergencies occurring within each respective emergency network entity geographic boundary, and provides location indicators within each respective jurisdictional map view, with each location indicator corresponding to an emergency.

Messaging system apparatuses circuits and methods of operation thereof

Disclosed arc a messaging system. apparatuses circuits and methods of operation thereof. A messaging client device is adapted to receive an impermanent message and to manage the received message in accordance with a message management policy associated with the message. An impermanent messaging server is adapted to validate said messaging client device as complying with message management policies prior to authorizing transmission of the message to said messaging client device.