G06F2221/2111

Method and system for monitoring and providing beneficial visual and auditory stimulation for dementia patients
11589799 · 2023-02-28 ·

An on-person portable device and/or app that allows for constant location monitoring of dementia patients is disclosed. Such a device and/or app also includes automated communication of facial recognition of persons proximally near such a patient as well as possible generation of certain music in response to patient status and/or location. The patient is provided the device and/or app for handling or wearing, such as a phone or pair of glasses, in order to follow location through GPS monitoring, and a reactive program therein that automatically views another person and provides an identification thereof coupled with a voice modulator within an earpiece or like device for memory stimulation pertaining to loved ones or friends, and the like. The same program may also provide the music response to comments, movement, or any other external stimuli to the subject patient, again, to evoke a memory stimulus, as well.

Devices, Systems, and Methods for Security Using Magnetic Field Based Identification

Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location.

METHOD AND APPARATUS FOR ENCRYPTING AND DECRYPTING PICTURE, AND DEVICE
20180007019 · 2018-01-04 ·

The present disclosure relates to the field of computer technologies and it discloses a method for encrypting a picture performed at a sending device, the method including: obtaining, by a sending device raw data of a to-be-encrypted picture, a first key, a second key, and location information that is used for adding disturbance data to the raw data; generating the disturbance data, and adding the disturbance data to the raw data according to the location information, to obtain first data; encrypting the first data by using the first key, to obtain the second data, and encrypting the first key and the length of the disturbance data by using the second key, to obtain first encrypted data; and sending the second data, the first encrypted data, and the second key to a receiving device.

SPEAKER VERIFICATION USING CO-LOCATION INFORMATION
20180012604 · 2018-01-11 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying a user in a multi-user environment. One of the methods includes receiving, by a first user device, an audio signal encoding an utterance, obtaining, by the first user device, a first speaker model for a first user of the first user device, obtaining, by the first user device for a second user of a second user device that is co-located with the first user device, a second speaker model for the second user or a second score that indicates a respective likelihood that the utterance was spoken by the second user, and determining, by the first user device, that the utterance was spoken by the first user using (i) the first speaker model and the second speaker model or (ii) the first speaker model and the second score.

Secure authentication
11709924 · 2023-07-25 · ·

Methods and systems are disclosed herein for authenticating a user. A security device may use an object associated with a user and a device of the user to authenticate the user, for example, if the user has forgotten a password. A user may insert the object (e.g., a card, or other object) into the security device and may select an option to authenticate via a device that is trusted by both the security device and the user, rather than authenticating by entering a password at the security device.

Systems and methods for location-based automated authentication

Systems, methods, and apparatuses for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range, and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

VERIFICATION SYSTEM
20230237135 · 2023-07-27 ·

A device includes memory and a processor. The device receives biometric information. The device receives location information. The device analyzes the received biometric information with stored biometric information. The device analyzes the received location information with stored location information. The device determines whether the received biometric information matches the stored biometric information. The device determines whether the received location information matches the stored location information. The device sends an electronic communication that indicates whether the received biometric information matches the stored biometric information and whether the received local information matches the stored location information.

MULTI STEP AUTHENTICATION METHOD AND SYSTEM
20230239291 · 2023-07-27 ·

A multi step authentication method for authenticating a person as an authorized person, the multi step authentication method being executed by a multi step authentication system including an authentication server, a user device, the method comprising the steps of executing a first authentication phase, the first authentication phase comprises performing a first authentication technique; executing a second authentication phase, the second authentication phase comprises performing a second authentication technique, wherein the first authentication technique and second authentication technique are disparate; both the first and second authentication techniques utilize contactless authentication techniques; wherein the second authentication phase is performed after the first authentication phase successfully authenticates a person as an authorized user, a person is authenticated as an authorized person or vehicle if both the first authentication phase and second authentication phase successfully authenticate the person or vehicle, and; wherein the first authentication phase and second authentication phase are sequentially alterable.

SYSTEMS AND METHODS FOR AUTOMATICALLY BLOCKING THE USE OF TRACKING TOOLS

Embodiments of the present invention provide methods, apparatus, systems, computing devices, computing entities, and/or the like for permitting or blocking tracking tools used through webpages. In particular embodiments, the method involves: scanning a webpage to identify a tracking tool configured for processing personal data; determining a data destination location that is associated with the tracking tool; and generating program code configured to: determine a location associated with a user who is associated with a rendering of the webpage; determine a prohibited data destination location based on the location associated with the user; determine that the data destination location associated with the tracking tool is not the prohibited data destination location; and responsive to the data destination location associated with the tracking tool not being the prohibited data destination location, permit the tracking tool to execute.

Medical device location authorization
11568985 · 2023-01-31 · ·

Systems, methods, and apparatus for medical device management are disclosed. An example tangible computer readable storage medium includes instructions that, when executed, cause a processor to at least launch a first user interface to configure a first user group based on a first role, generate a role mapping in response to configuring the first user group based on the first association, launch a second user interface to configure the first user group based on a first deployment location, generate a location mapping in response to configuring the first user group based on the second association, generate a combined location and role mapping based on the role mapping and the location mapping, and launch a third user interface to facilitate interaction of the first user account with the medical device in response to determining whether the first user account is authorized to access the medical device based on the combined mapping.