H04W12/63

Prestaging, gesture-based, access control system

A prestaging, gesture-based, access control system includes a local access assembly, a mobile device, a storage medium, and a processor. The assembly includes a controller to effect actuation between access and no-access states. The mobile device is carried by a user, and includes a detection system configured to detect a prestaging event inherently performed by the user toward an intent to gain access and followed by the detection of a primary intentional gesture specifically performed by the user toward the intent to gain access. The storage medium and the processor are configured to receive prestaging event information and primary intentional gesture information from the detection system, and execute an application to determine the performance of the prestaging event from the prestaging event information, then determine the performance of the primary intentional gesture from the primary intentional gesture information if the prestaging event is determined to have occurred.

Open channel communication system
11558726 · 2023-01-17 ·

Described is an open communication system. The system includes a server having a memory storing user data and a first user computing device coupled to the server. The server may be programmed to allow multiple user computing devices to connect to the server and the server determines if the user computing devices are within a predetermined proximity to each other and whether the same communication channel is selected. All of the user computing devices that have selected the same communication channel and are within the predetermined proximity to each may be connected in an open communication link that allows the connected user to communicate. The system may include the option of establishing and invite particular users to a private or less used channel.

BYSTANDER-CENTRIC PRIVACY CONTROLS FOR RECORDING DEVICES
20230011087 · 2023-01-12 ·

A recording device provides bystander-centric privacy controls for authorizing the storage of a bystander's identifying information (e.g., video or audio recordings of the bystander). Before a recording device can store identifying information of bystanders, the bystanders may indicate to the recording device whether they authorize the storage. If the bystanders do not authorize the storage, the recording device may modify the identifying information captured by sensors, such as a video camera or a microphone, such that the identity of the non-authorizing bystander is not identifiable through the modified identifying information. Thus, bystanders are given increased agency over whether they want to be recorded. Further, if the bystanders do not want to be recorded, sensor data that may identify them is modified by the recording device to prevent unwanted exposure of their identity in recorded content.

BYSTANDER-CENTRIC PRIVACY CONTROLS FOR RECORDING DEVICES
20230011087 · 2023-01-12 ·

A recording device provides bystander-centric privacy controls for authorizing the storage of a bystander's identifying information (e.g., video or audio recordings of the bystander). Before a recording device can store identifying information of bystanders, the bystanders may indicate to the recording device whether they authorize the storage. If the bystanders do not authorize the storage, the recording device may modify the identifying information captured by sensors, such as a video camera or a microphone, such that the identity of the non-authorizing bystander is not identifiable through the modified identifying information. Thus, bystanders are given increased agency over whether they want to be recorded. Further, if the bystanders do not want to be recorded, sensor data that may identify them is modified by the recording device to prevent unwanted exposure of their identity in recorded content.

Effortless authentication for desktop computers using wrist wearable tokens

A system and method for authenticating users of a digital device includes an authentication device attached to an authorized user. The authentication device includes one or more motion sensors and acts as a user identity token. To authenticate with a digital device, the user performs one or more interactions with the digital device using the hand associated with the authentication device. The digital device correlates the inputs received due to the interactions with the user's hand and/or wrist movement, as measured by the authentication device. Access to the digital device is allowed if the inputs and movements are correlated.

Effortless authentication for desktop computers using wrist wearable tokens

A system and method for authenticating users of a digital device includes an authentication device attached to an authorized user. The authentication device includes one or more motion sensors and acts as a user identity token. To authenticate with a digital device, the user performs one or more interactions with the digital device using the hand associated with the authentication device. The digital device correlates the inputs received due to the interactions with the user's hand and/or wrist movement, as measured by the authentication device. Access to the digital device is allowed if the inputs and movements are correlated.

BEACON-BASED INTEGRATED SECURITY MONITORING

An electronic device configured for retail display includes an antenna, a memory in which security monitoring instructions are stored, and a processor configured to execute the security monitoring instructions to monitor a profile of wireless beacon devices detected via the antenna. The processor is further configured via the execution of the security monitoring instructions to, upon detection of a profile of wireless beacon devices that exceeds a threshold, initiate a security measure for the electronic device.

BEACON-BASED INTEGRATED SECURITY MONITORING

An electronic device configured for retail display includes an antenna, a memory in which security monitoring instructions are stored, and a processor configured to execute the security monitoring instructions to monitor a profile of wireless beacon devices detected via the antenna. The processor is further configured via the execution of the security monitoring instructions to, upon detection of a profile of wireless beacon devices that exceeds a threshold, initiate a security measure for the electronic device.

Creating a secure digital identity

Methods and systems for creating a verifiable digital identity are provided. The method includes obtaining a first user-generated item comprising an identifiable feature. The method also includes digitally signing the first user-generated item to generate a secure digital artifact. The method also includes uploading the secure digital artifact and the first user-generated item to an auditable chain of a public ledger. The method also includes verifying a digital identity of the user by auditing the auditable chain. The method also includes obtaining a second user-generated item generated comprising the identifiable feature. The method also includes comparing the first and second user-generated items. The method also includes uploading the second user-generated item to the public ledger when the comparing is within a threshold.

Systems and methods for distributed P25 LMR radio vulnerability management and real-time interference monitoring

A threat monitoring and vulnerability management system is disclosed. The system includes one or more sensors configured to scan a frequency spectrum of a project 25 (P25) network and to collect data on the P25 network. The system further includes a server coupled to the sensors and configured to receive the collected data from the plurality of sensors, compare the collected data with previously stored historical data to determine whether an anomaly exists within data patterns of the collected data, responsive to determining that the anomaly exists, determine at least one of: whether use of a cloned radio that mimics an authorized connection occurs, whether jamming of a radio frequency (RF) communication occurs, or whether jamming of a voice communication occurs within the P25 network by comparing the collected data with preset thresholds, and send a real-time alert to a dispatch and control console unit coupled to the server and the P25 network in response to determining that some of the collected data exceeds at least one of the preset thresholds, such that the dispatch and control console unit provides one or more corrective actions to the P25 network.