G06F2221/2111

Data security across data residency restriction boundaries

Data security across data residency restriction boundaries is provided by obtaining and profiling a dataset on which a desired analysis is to be performed, with some results of the desired analysis to be transferred from one location to another, the dataset subject to data residency restrictions that restrict transfer of the dataset across a boundary to the another location, and the profiling identifying a profile level for the dataset, then automatically generating a container image based on the profile level and the data residency restrictions that restrict the transfer of the dataset across the boundary, the container image configured for instantiation and execution to process the dataset into a reformatted dataset not restricted by the data residency restrictions for transfer across the boundary, and storing the container image to a container registry.

Geographic population health information system

A method and system for providing a data analysis in the form of a customized geographic visualization on a graphical user interface (GUI) on a remote client computing device using only a web browser on the remote client device. The system receives a user's selected data analysis to be performed by the system for display on the remote client device. The system verifies the data access permissions of the user to render a data analysis solution customized to that particular user, and automatically prevents that user from gaining access to data analysis solutions to which that user is prohibited. The system is configured to respond to the user's data analysis request, perform the necessary computations on the server side on the fly, and send a dataset interpretable by the client device's web browser for display on the client device or on a device associated with the client device.

SYSTEM AND METHOD FOR SECURE CODE SCANNING

Graphical codes, such as Quick Response (QR) codes, are commonly used for convenient acquisition by a mobile device of a text string (e.g., a Uniform Resource Locator identifying a website) or other data word. Such an acquisition, however, may be a relatively low-security operation because of the relative ease with which such graphical codes may be produced. As such, a system and method for secure code scanning and verification are provided.

Security enabled false desktop computing environment

A computing system for securely managing access to resources of a computing device receives an input at a secure login of a user interface. The computing system compares the input to a plurality of stored security measures and activates one of an operating system or a configuration of a false desktop system. A user interface of the false desktop system shares characteristics with a user interface of an operating system and restricts access to specified files, data stores, applications, networking functions, and/or ports associated with the computing system. When configured, the false desktop system or the operating system is enabled based on the location of the computing system. When configured, the false desktop system deletes files, data stores, and applications of the operating system.

Trust agents
11693974 · 2023-07-04 · ·

Systems and techniques are provided for trust agents. Trust agents may be enabled. A state determination may be received from each of the enabled trust agents. The state determination may indicate either a trusted state or an untrusted state. The received state determinations may be combined to determine a security state. A security measure may be enabled or disabled based on the determined security state.

Unique ID generation for sensors

Systems, methods, and computer-readable media are provided for generating a unique ID for a sensor in a network. Once the sensor is installed on a component of the network, the sensor can send attributes of the sensor to a control server of the network. The attributes of the sensor can include at least one unique identifier of the sensor or the host component of the sensor. The control server can determine a hash value using a one-way hash function and a secret key, send the hash value to the sensor, and designate the hash value as a sensor ID of the sensor. In response to receiving the sensor ID, the sensor can incorporate the sensor ID in subsequent communication messages. Other components of the network can verify the validity of the sensor using a hash of the at least one unique identifier of the sensor and the secret key.

Automated authentication systems and methods including automated waste management system with automated weight ticket and authentication
11693935 · 2023-07-04 · ·

Disclosed and described herein are systems and methods that bring together edge technologies into a single, streamlined process that automates the tracking and usage of assets (containers, equipment, mobile storage, etc.). These systems and methods include the use of smart beacons, low power cellular, sensors (strain gauges, level, contact, ohm/voltage, etc.), voice, video, microcontroller advancements, and the like. Conventional systems that have electronic service order and/or tickets are still limited in their functionality because of data, communication and processing hurdles. Disclosed are modern electronic data capture systems (IoT sensors) along with algorithms to assist on the tracking of assets and workers, more quickly capture authorized transactions for billing and remove the manual processes.

Systematic integration via an intrusion detection device

A vehicle theft-prevention apparatus can include at least one computing device couple to a plurality of sensors and a wireless transceiver. The plurality of sensors can be configured to sense measurements proximate to a vehicle. The at least one computing device can be configured to read a plurality of first measurements of a first sensor of the plurality of sensors. Based on the plurality of first measurements from the first sensor, the at least one computing device can determine that a key fob moved outside of a range of the first sensor. In response to the key fob moving outside of the range of the first sensor, the at least one computing device can transition to an armed state. The at least one computing device can read a plurality of second measurements from a subset of the plurality of sensors. Based on the plurality of second measurements, the at least one computing device can determine that a person has entered the vehicle.

SYSTEMS AND METHODS FOR PROACTIVELY PREEMPTING/MITIGATING AXIETY-RELATED BEHAVIORS AND ASSOCIATED ISSUES/EVENTS
20230007439 · 2023-01-05 ·

Exemplary embodiments are disclosed of systems and methods for proactively preempting/mitigating anxiety-related behaviors and associated issues/events.

File containerization and management

This disclosure is directed to embodiments of systems and methods for containerizing files and managing policy data applied to the resulting containers. In some of the disclosed embodiments, a computing system determines that a file stored in storage medium is to be included in a container to be sent to at least one computing component associated with a device including a user interface. The computing system determines that the file is of a particular type and also determines code that can be used to access files of the particular type. The computing system combines the file and the code into the container such that container is configured to be executed by the at least one computing component so as to cause content of the file to be presented by the user interface. The computing system then sends the container to the at least one computing component. In some implementations, the container may further include policy information defining at least one of whether, how, where, when, or by whom the file can be accessed using the code. A communication link may be established between the computing system and the container at the at least one computing component and an instruction may be sent via the communication link that causes a change to the policy information.