H04L63/302

PERSONAL SECURITY MONITORING
20230130298 · 2023-04-27 ·

Computer-implemented services provide personal security monitoring and/or oversight of interactions between parties that may be initiated online, and in some circumstances extended to real-world in-person interactions. Profiles associated with individuals involved in a transaction may be developed and centrally managed. Profiles may contain, e.g., information concerning a user's identity, historical and/or current location information, user communication information, and the like. Profile information may be used by a central security oversight platform and/or provided to third party systems for, e.g., assessing risks involved in a particular interaction, providing accountability amongst users, and assisting law enforcement or third parties in transaction intercession and/or investigation in the event that an interaction results in negative consequences.

NON FUNGIBLE TOKENS (NFTS) FOR DECENTRALIZED CAMPAIGN/ATO PLANNING AND EXECUTION
20220329427 · 2022-10-13 ·

Blockchain technology is used to generate and maintain Non Fungible Tokens (NFTs) for use in combat planning and execution.

Secure forum facilitator in controlled environment
11621934 · 2023-04-04 · ·

An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.

METHODS AND APPARTUS TO DETERMINE A NUMBER OF PEOPLE IN AN AREA
20230139603 · 2023-05-04 ·

Methods, apparatus, systems and articles of manufacture are disclosed to determine the number of people at a location. An example apparatus includes a configuration changer to change a configuration setting of the base station to cause mobile devices to register with the base station, a registration manager to respond to registration requests received from the mobile devices after the configuration setting is changed by storing device identification information for the corresponding mobile devices, and a counter controller to identify a number of the mobile devices at a location of the base station based on the stored device identification information.

GRAPHICAL USER INTERFACE FOR CENTRALIZED REGISTER DEVICE MANAGEMENT AND MONITORING

In some implementations, a device may receive, via a data stream, log data associated with a set of register devices and may extract state information associated with the set of register devices from the log data. The device may transmit, to a client device, presentation information to cause the state information associated with the set of register devices and one or more user selection options for initiating actions to be performed by the set of register devices to be displayed by the client device via a graphical user interface (GUI). The device may receive an indication of a user input provided via the GUI associated with a user selection option of the one or more user selection options, that indicates an action to be performed by a register device. The device may communicate, with the register device, to cause the register device to perform the action.

SYSTEMS AND METHODS FOR CLOUD-BASED FEDERATED RECORDS RETENTION COMPLIANCE ORCHESTRATION, VALIDATION AND ENFORCEMENT
20230136439 · 2023-05-04 ·

Through a cloud-based centralized user interface, a federated compliance system presents a policy of interest and representations of disparate systems that match the policy of interest to a user. The disparate systems, which operate in a distributed network computing environment, can include cloud-based repositories and off-cloud repositories. The federated compliance system can pull the cloud-based repositories through a cloud orchestrator and the off-cloud repositories through an off-cloud orchestrator over a secure tunnel. The federated compliance system utilizes user-provided information on the policy of interest to determine various categories of attributes from different repository schemas employed by the disparate systems. A federated retention policy mapper, implemented as a compliance service, maps the attributes to a common schema, creates a federated retention policy, and stores it in a federated space in the distributed network computing environment. A policy change can be automatically propagated across the disparate systems using the federated retention policy.

System and method for digital evidence analysis and authentication

The system disclosed provides an efficient mechanism for acquiring email and other data from remote systems in a forensically sound manner. Email for users can be requested by investigators from email servers across the country. It is then be automatically acquired and made available to the examiner, subject to approval, and any others he deems have a need-to-know on a web based system. The data can be searched and bookmarked, and the bookmarks shared. Data can also be uploaded manually and combined with email data in the searching, bookmarking, and sharing.

SECURE FORUM FACILITATOR IN CONTROLLED ENVIRONMENT
20220385610 · 2022-12-01 · ·

An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.

Methods and apparatus to determine a number of people in an area

Methods, apparatus, systems and articles of manufacture are disclosed to determine the number of people at a location. An example method includes collecting media identification information corresponding to media presented at a location, changing an identifier of a base station local to the location to cause mobile devices located at the location to attempt to register with the base station, responding to a received request to register a mobile device with the base station by storing device identification information for the corresponding mobile device at the base station, determining a number of mobile devices located at the location based on the stored device identification information, and identifying a number of persons exposed to the media based on the mobile devices located at the location.

Incident data collection for public protection agencies

An approach is provided in which a public protection system sends a data collection request to user devices located within a geographical proximity of an incident in progress that instructs the user devices to capture real-time data corresponding to the incident in progress. The public protection system receives the real-time data from the user devices and determines that a set of the real-time data includes evidence data corresponding to the incident in progress.