G06F21/629

Medical device location authorization
11568985 · 2023-01-31 · ·

Systems, methods, and apparatus for medical device management are disclosed. An example tangible computer readable storage medium includes instructions that, when executed, cause a processor to at least launch a first user interface to configure a first user group based on a first role, generate a role mapping in response to configuring the first user group based on the first association, launch a second user interface to configure the first user group based on a first deployment location, generate a location mapping in response to configuring the first user group based on the second association, generate a combined location and role mapping based on the role mapping and the location mapping, and launch a third user interface to facilitate interaction of the first user account with the medical device in response to determining whether the first user account is authorized to access the medical device based on the combined mapping.

Information provision apparatus and information provision method
11568071 · 2023-01-31 · ·

An information provision apparatus includes a memory configured to store personal data for each user, and a processor coupled to the memory and configured to in response to receiving a request for first personal data of a first user from a terminal device, determine difference between first data stored in the memory as the first personal data at a first time of receiving the request and second data stored in the memory as the first personal data at a second time before the first time, provision of the second data being permitted, perform, in accordance with the difference, determination of whether provision of the first data is permitted, and when it is determined that the provision of the first data is permitted, transmit the first data to the terminal device.

Contextual API captcha

A request for use of an application programming interface (API) is received. Context associated with the request is determined. Based on the context, a challenge is generated, which can be used for determining whether to permit the use of the API. A response to the challenge is received. Based on the response, the request can be facilitated for using the API.

SYSTEMS, METHODS, AND DEVICES FOR IMPLEMENTING SECURITY PLATFORMS
20230237197 · 2023-07-27 ·

Systems, methods, and devices implement security policies in security platforms implemented across web servers and application servers. Systems include one or more processors configured to identify an application installed in an application environment, receive an input associated with the application, and generate one or more dynamic security policies associated with the application based, at least in part, on the input and one or more application components, the one or more dynamic security policies defining one or more security operations for application data objects included in the application. Systems also include a database system configured to store the plurality of dynamic security policies associated with the application.

Display assistant device having a monitoring mode and an assistant mode

A display assistant device comprises a display, a camera, a speaker, microphones, a processor and memory. The memory stores programs comprising instructions that, when executed by the processor, enable a plurality of modes of the display assistant device. The modes include a monitoring mode and an assistant mode. In the monitoring mode, the device is configured to perform a remote monitoring function in which first video captured by the camera is streamed to a remote server system for monitoring uses. The monitoring uses include transmission of the first video to remote client devices authorized to access the first video. In the assistant mode, the device is configured to perform a second plurality of functions that excludes the monitoring function and includes a video communication function in which second video captured by the camera is transmitted to second devices participating in a video communication with a first user of the device.

Method of adapting a user interface on a mobile communication device based on different environments

A method of providing a user interface on a mobile communication device to control smart devices in an environment. The method comprises discovering a plurality of smart devices in an environment by a client application executing on a mobile communication device by initiating wireless communication between the mobile communication device and the plurality of smart devices, wherein the client application learns an electronic model identity of each of the discovered smart devices, communicating with a data store by the client application to look-up control interfaces of the discovered smart devices based on the electronic model identities of the smart devices, looking-up predefined environmental preferences associated with the mobile communication device in the data store by the client application, transmitting control commands by the client application to the plurality of smart devices based in part on the looked-up predefined environmental preferences.

VIRTUAL BROWSER APPLICATION SYSTEMS AND METHODS
20230026368 · 2023-01-26 ·

Disclosed embodiments provide a framework for provisioning a virtual browser application environment accessible using a native browser application. The virtual browser application environment is implemented on a virtual machine instance, where the virtual environment is isolated from other functionality of the virtual machine instance. In response to a request to access the environment, a set of access control policies are identified. The access control policies define a level of access to actions that can be performed within the environment. The environment is presented through a website executed on a user's native browser application. The user's interactions with the environment and with any other users within the environment are monitored in real-time according to the access control policies.

Proximity-sensor supporting multiple application services
11562644 · 2023-01-24 · ·

A personal digital key (e.g., which can be carried by a human) contains a memory having different service blocks. Each service block is accessible by a corresponding service block access key. As the personal digital key (PDK) moves around, it is detected by sensors. The sensors report position data, thus enabling location tracking of the PDK. The sensors also provide a data path to various applications. An application that has access to a service block access key can therefore access the corresponding service block on the PDK. The sensors themselves may also contain service block access keys.

ENCRYPTION PROCESSING SYSTEM, NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ENCRYPTION PROCESSING PROGRAM, AND ENCRYPTION PROCESSING METHOD
20230229815 · 2023-07-20 · ·

An encryption processing system in which an application accesses a security module, via software, from a device driver that communicates with the software, in which the software issues an identifier for managing a session for each access request from the application, to identify accesses from plural applications, and notifies the device driver of identifiers together with commands.

Remote feature activation in power machines

Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.