G06F2221/2111

PLATFORM FRAMEWORK SECURITY STATE MANAGEMENT

Embodiments of systems and methods for platform framework security state management are described. In some embodiments, an Information Handling System (IHS) collects context information that describes logical and physical environments in which the IHS is operating. This context information is used to determine a security state for the IHS. A launch of a resource of the IHS is detected. In response, updated context information is collected that further describes the logical and physical environments. Based on the security state, the launched resource and the updated context information, an updated security state of the IHS is determined. Based on the updated security state, changes are determined to security policies that are used to operate hardware devices of the IHS. Platform framework participants are identified that are registered users of the security polices affected by the updated security state, and these participants are notified of the security policy changes.

Systems and methods for providing access to wireless gaming devices

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.

Verification system
11538129 · 2022-12-27 · ·

A device includes memory and a processor. The device receives biometric information. The device receives location information. The device analyzes the received biometric information with stored biometric information. The device analyzes the received location information with stored location information. The device determines whether the received biometric information matches the stored biometric information. The device determines whether the received location information matches the stored location information. The device sends an electronic communication that indicates whether the received biometric information matches the stored biometric information and whether the received local information matches stored geographic location that is not within a particular distance of another geographic location.

Privacy protection in mobile robot

A mobile robot is configured for operation in a commercial or industrial setting, such as an office building or retail store. The mobile robot may include cameras for capturing images and videos and include microphones for capturing audio of its surroundings. To improve privacy by preventing confidential information from being transmitted, the mobile robot may detect text in images and modify the images to make the text illegible before transmitting the images. The mobile robot may also detect human voice in audio and modify audio to make the human voice unintelligible before transmitting the audio.

Executing and re-executing a list of component handlers defined for a resource in response to detecting a creation, deletion, or modification of the resource
11537437 · 2022-12-27 · ·

A specialized in-memory database health check process is utilized to resolve dependencies in a resource indicating requirements for an instance of an in-memory database. Specifically, when an instance of an in-memory database is created in response to a request, a list of one or more component handlers are obtained. These component handlers are modular functions, separate from each other but potentially dependent on one or more other component handlers, and act to validate various requirements listed in a resource for the request. Each of the component handlers are executed individually during execution of a Reconcile function. To the extent that the execution of any component handlers in the list is unsuccessful, the Reconcile function is rerun for another iteration. These iterations continue until all component handlers report back as successful. Instance creation is then considered successful and the instance of the in-memory database can be utilized by users.

ACCESS CONTROL SYSTEM AND METHOD THEREOF

The present invention provides a robust and effective solution to an entity or an organization for fully ensuring people and property security by designing and developing an intelligent access control system (ACS) that can provide a smart, swift and simplified user authentication and authorization mechanism. This proposed system may be an event-driven system. A plurality of events such as location-centric, people-inspired, unplanned, and the like can be captured and acted upon by using artificial intelligence along with an adaptive control system.

Multi-modal access policy enforcement
11533319 · 2022-12-20 · ·

For access policy enforcement, a method restricts access to a decryption key for private data on an electronic device. The private data is encrypted and includes group communications. The method determines an electronic device profile that includes a device time and a device location of the electronic device. The method releases the decryption key in response to the electronic device profile satisfying an access policy. The method decrypts the private data using the decryption key.

BAGGAGE-BASED IDENTIFICATION AND VERIFICATION SYSTEM AND METHOD
20220398300 · 2022-12-15 ·

Systems and methods for baggage identification and baggage-based user identity verification are described. In one embodiment, a user device receives a challenge message associated with a baggage item, from a server. In response, the device outputs, by an augmented or mixed reality user interface, a prompt to respond to the challenge using the baggage item. The augmented or mixed reality user interface receives a user's response to the challenge message, the response identifying a user-defined location on the baggage item. The device generates a response to the challenge message based on the identified location. The response is transmitted to the server, whereby a result is received from the server based on verification of the user-defined location communicated via the challenge response. Other embodiments are also described.

IN-VEHICLE INFORMATION PROCESSING APPARATUS, PROGRAM EXECUTION RESTRICTION METHOD, AND COMPUTER PROGRAM
20220396218 · 2022-12-15 ·

Provided are an in-vehicle information processing apparatus, a program execution restriction method and a computer program that can be expected to provide users with an opportunity to fully use the trial version of an application program. An in-vehicle information processing apparatus according to one embodiment is an in-vehicle information processing apparatus to be mounted in a vehicle and for executing a program, the apparatus including a processing unit, whereby the processing unit determines whether the travel distance of the vehicle from when usage of the program is started exceeds a threshold value, and, if it is determined that the travel distance exceeds the threshold value, restricts subsequent execution of the program. The processing unit of the in-vehicle information processing apparatus may acquire the program and information relating to the threshold value from a device provided externally to the vehicle.

SYSTEM FOR IMPLEMENTING CONTINUOUS AUTHENTICATION BASED ON OBJECT LOCATION RECOGNITION
20220398301 · 2022-12-15 · ·

Systems, computer program products, and methods are described herein for implementing continuous authentication based on object location recognition. The present invention is configured to receive, from the computing device of a user, a request for primary authorized access; receive, via the augmented reality application, a real-time visual feed, wherein the real-time visual feed comprises one or more objects; determine one or more positional parameters associated with the one or more objects; determine that the one or more objects and the one or more positional parameters associated with the one or more objects meets one or more requirements for the primary authorized access; and transmit control signals configured to cause the computing device of the user to display a notification indicating that the user has been granted the primary authorized access.