Patent classifications
G06Q50/265
Selective security regulation for network communication
Embodiments of the present invention provide a system for providing selective security regulations associated with network communications to users. The system is configured for extracting user data associated with a user, identifying one or more characteristics based on the extracted user data, generating a custom security package for the user based on the one or more characteristics, displaying one or more options associated with the custom security package on a user device of the user, prompting the user to select at least one option from the one or more options, receiving the at least one option from the user, and deploying a functionality associated with the at least one option from the custom security package.
Methods for sharing private video streams with first responders under facility administrator control
A method enables video surveillance service subscribers to share image streams with individual first responder agencies in the event of emergency. A customer administrator selects permissions on each camera via privileged web-browser or mobile device. Permissions enable selection by static meta data such as type, audio, location, motion, recognition, spectrum, and epoch. Setting ranges of time controls access to video streams of present and past epochs. Under control by a customer administrator, a virtual machine dedicated to each responding agency instantiates a video server. A camera is shared by a customer administrator's selection of permissions on each camera via privileged web-browser or mobile device. Video streams of present and past epochs are controlled by ranges of time. A notification is customized for each responding agency and each event by dynamically generating a link to a secure webserver which records geo-location or network identifiers for validation.
COORDINATED AUTONOMOUS VEHICLE AUTOMATIC AREA SCANNING
Methods and systems for autonomous and semi-autonomous vehicle control, routing, and automatic feature adjustment are disclosed. Sensors associated with autonomous operation features may be utilized to search an area for missing persons, stolen vehicles, or similar persons or items of interest. Sensor data associated with the features may be automatically collected and analyzed to passively search for missing persons or vehicles without vehicle operator involvement. Search criteria may be determined by a remote server and communicated to a plurality of vehicles within a search area. In response to which, sensor data may be collected and analyzed by the vehicles. When sensor data generated by a vehicle matches the search criteria, the vehicle may communicate the information to the remote server.
INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND STORAGE MEDIUM
An information processing apparatus includes: an information management unit that registers boarding information on users regarding boarding and biometrics information on the users acquired by a check-in procedure of the users in association with each other; and a comparison unit that compares target biometrics information, which is biometrics information acquired in a procedure up to the boarding for one of the users, with registered biometrics information, which is the biometrics information registered by the information management unit, and the comparison unit selects the registered biometrics information to be compared with the target biometrics information based on status regarding the procedure up to the boarding of the user corresponding to the registered biometrics information.
Real-time managing evacuation of a building
The present disclosure relates an evacuation management system, EMS, (40, 52, 60, 00, 200) operative to provide real-time evacuation information for evacuation of a building, triggered by alarm notification (S202). Based on determined (S214) precise real-time positions of personal ultra-wide band, UWB, devices, as determined by UWB real-time localization system, RTLS, a controller determines (S210) evacuation plans being personal UWB device specific in real-time. Based on individual evacuation plans and input from building facilities, real-time guidance information is defined (S208) and sent to each personal UWB device, providing guidance to person carrying said personal UWB device, in what direction to move (S212), to reach a safe area. Based on localization signals the UWB RTLSA then calculates updated positions of the personal UWB devices and sends to the evacuation management system. It is an advantage that trapped or injured people can be found, even in low visibility areas.
TRAVEL IDENTITY TOKENING
A system for leveraging a tokening system to authenticate a traveler while maintaining anonymity of the traveler is provided. The system may include a secure central server configured to store identification data associated with a plurality of users. The system may also include a mobile token application for providing a token identifier representing a user's identification data. The mobile token application may be activated by the central server on a mobile device of the user registered with the central server and stored in a secure storage on the mobile device of the user. The system may also include a travel service provider. The travel service provider may be configured to enable reserving a travel reservation file. The travel service provider may be enabled to retrieve a token identifier from the user's mobile device as representing the identification of the user and verify the token identifier with the central server.
Systems and methods for emergency data integration
A disclosed apparatus obtains emergency data for multiple device types from a plurality of emergency data sources and provides a jurisdictional map view to a plurality of emergency network entities, where each emergency network entity corresponds to a given geographic boundary. The jurisdictional map view corresponds to a respective emergency network entity's geographic boundary. The apparatus determines portions of the emergency data corresponding to emergencies occurring within each respective emergency network entity geographic boundary, and provides location indicators within each respective jurisdictional map view, with each location indicator corresponding to an emergency.
METHOD AND SYSTEM FOR DIGITAL IDENTITY AND TRANSACTION VERIFICATION
Methods of determining whether to trust an entity before sharing information with the entity, as well as methods of verifying whether to trust information received from an entity, are disclosed. In the processes, two entities, referred to as a holder and a verifier, desire to engage in an exchange of digital information. Before the holder will share information with the verifier, the holder will determine whether the verifier is a trusted entity. Before the verifier trusts information that it receives from the holder, it will examine a proof that it received from the holder to determine whether the proof includes information from or about a trusted third party referred to as an issuer. Information from an identity authority may be used in each of these verification steps.
PREDICTING CUSTOMER CHANGE OF ADDRESS BASED ON WEB BROWSING ACTIVITY AND TRANSACTIONS
Aspects provided may allow for the determination that a consumer has changed an address based on the consumer's online transactions. By obtaining corresponding data for a consumer for each online transaction and providing location data to a machine-learning model, which is configured to evaluate the likelihood that a consumer has changed addresses based on location data records associated with consumer online activity, the model may generate a prediction that a consumer has changed their address. Based on this prediction, a change of address process for the consumer may be initiated. Further aspects provide methods of obtaining the location information, methods of generating supplemental location data based on a consumer's in-person transactions, and training a machine-learning model.
Secure authentication based on physically unclonable functions
The invention relates to an electronic device, and more particularly, to systems, devices and methods of authenticating the electronic device using a challenge-response process that is based on a physically unclonable function (PUF). The electronic device comprises a PUF element, a processor and a communication interface. The PUF element generates an input signal based on at least one PUF that has unique physical features affected by manufacturing variability. A challenge-response database, comprising a plurality of challenges and a plurality of corresponding responses, is set forth by the processor based on the PUF-based input and further provided to a trusted entity. During the trusted transaction, the processor generates a response in response to a challenge sent by the trusted entity based on the PUF-based input, and thereby, the trusted entity authenticates the electronic device by comparing the response with the challenge-response database.