G06F2221/2137

Glucose level control system with therapy customization

Systems and methods are disclosed herein for providing a configuration code for customizing a glucose level control system for at least an initial period. The configuration code can be based on one or more dosing parameters from a tracked medicament therapy administered to a subject over a tracking period by the glucose level control system. The configuration code includes encoded dosing parameters including a correction dosing parameter based on at least some of the correction boluses of medicament administered during the tracking period, a food intake dosing parameter comprising an indication of a food intake bolus size of medicament based on one or more food intake boluses provided during the tracking period, and a basal dosing parameter based on at least some of the basal doses of medicament administered during the tracking period.

Systems and methods to temporarily grant access to a digital gateway

Systems and methods are provided for temporarily granting access to a digital gateway. One example method includes receiving a request for temporary access to the digital gateway. A temporary access token is generated at a server. The temporary access token is assigned to a user. Access to the digital gateway is granted via the temporary access token. The temporary access token is automatically expired after a pre-set period. Access to the digital gateway is revoked once the temporary access token has expired.

System and method of enrolling users of a wireless biometric lockset

A method of enrolling a user at a biometric lockset is described. The method includes receiving user access information from a mobile device of an administrative user of the biometric lockset. The user access information indicates to the biometric lockset to enter an enrollment mode in which a user identity is associated with fingerprint data in a user entry within a memory of the biometric lockset. A plurality of different light codes are displayed on the lockset, each one of the plurality of light codes representative of a different state of fingerprint data capture. A message is transmitted to the mobile device, and corresponds to the light code displayed at the lockset. The completed fingerprint data is stored in association with the user identity of the user in the user entry.

Systems and methods for managing secure sharing of online data

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.

Method for sharing and searching playlists

A method for making a playlist available to the public, in which the playlist comprises user-defined descriptor information. The user-defined descriptor information is entered as free form text or prose.

Device management system

A system manages usage of a network-enabled user device. A policy storage is separately located relative to the user device and stores usage policy sets. Each policy set comprises policies defining usage permissions/restrictions applicable to the user device. The system associates a first user with a first time period and a second user with a second time period, each time period exclusive of other time periods. The first user selects/modifies a first policy set for applying during the first time period, and the second user selects/modifies a second policy set for applying during the second time period. The first user cannot select/modify any policy set applicable during the second time period, and the second user cannot select/modify any policy set applicable during the first time period. A usage request from the user device is allowed/denied based on the policy set to be applied when the usage request is made.

COGNITIVE TOKENS FOR AUTHORIZING RESTRICTED ACCESS FOR CYBER FORENSICS
20220350899 · 2022-11-03 · ·

Restricted access tokens are cognitively generated that provide cyber forensic specialists restricted access to applications that require investigation. Cognitive analysis is performed on case details and, in some instances, evidence logs of previously investigated applications to determine parties involved in the investigation and applications requiring investigation. In response to identifying one of the applications, the case details, applicable evidence logs and the identified application are cognitively analyzed to determine operations that are required to be performed in the application and a time required to perform the operations. A restricted access token is generated that is specific to the assigned specialist, the case, and the application. The restricted access token grants the assigned specialist access to only data in the application associated with the one or more parties, rights to perform only the one or more operations in the application, and access to the initial application for a usage time that is based on the time required to perform the operations.

Determining validity of subscription to use digital content
11615388 · 2023-03-28 · ·

Some embodiments provide a method for determining whether a subscription for using digital content on a user device has elapsed. The method compares a first collision free image of a first set of entities in the user device with a second collision free image for a second set of entities in the user device at a second instance in time. Based on the comparison, the method determines whether the subscription has elapsed.

Device authentication system and method
11617080 · 2023-03-28 ·

There is a system for controlling access to an electronic device. This system can comprise at least one server having at least one microprocessor. There can be at least one remote device having at least one microprocessor, and at least one GPS location device, wherein the one remote device is configured to communicate a location of the at least one remote device. This remote device further comprises any one of at least one transceiver configured to communicate wirelessly, at least one biometric reader configured to read a biometric of a user and/or at least one hardware reader configured to read an identification piece. Thus, the electronic device is selectively unlocked via either an internal lock or via the server authenticating a location of the remote device, a Wifi signal of the remote device, a biometric reading of the remote device and a reading of the hardware reader of the remote device.

Method and system for providing a waveform dataset and signal generation device
11615259 · 2023-03-28 ·

The present invention relates to a generation of a signal by executing a waveform dataset comprising waveform descriptive parameters. The execution of the waveform description parameters is limited by target device information specifying one or more specific target devices and time information specifying an execution period of the waveform descriptive parameters. By providing a waveform dataset comprising not only the waveform descriptive parameters, but also further information, in particular time information for limiting the execution period of the waveform descriptive parameters, the generation of the respective waveform signal is controlled.