H04L63/107

MAP-BASED GRAPHICAL USER INTERFACE FOR MULTI-TYPE SOCIAL MEDIA GALLERIES

A social media platform provides a map-based graphical user interface (GUI) with multiple geographically anchored icons that are selectable to trigger playback of respective galleries of ephemeral messages. Each of the plurality of location-based ephemeral galleries comprises media content contributed by multiple different users. The ephemeral galleries are compiled based on geotag data associated with respective ephemeral messages submitted by multiple users to be publicly viewable via the map-based GUI. Two or more different types of galleries are represented in the map-based GUI by different, visually distinct types of gallery icon.

METHOD FOR CONVEYING PERSONALISED INFORMATION TO A USER OF A BUILDING
20230047608 · 2023-02-16 ·

In a building communication system for a building, a server device is provided which has a processor device and a storage device connected thereto, the storage device storing data sets in which display information that is predetermined for visitors is provided. An optical code is provided on the building, which optical code can be read by a mobile device of a visitor. In order to contact a resident of the building, the visitor scans the optical code with a mobile device. If the visitor is known in the system, the server device sends the display information predetermined for the visitor to their mobile device, which displays the personalized display information on a display of the mobile device.

COMMUNICATIONS DEVICE, METHOD AND COMMUNICATIONS SYSTEM FOR MANAGING AN AUTHENTICATION EVENT

A communications device for managing an authentication event is provided, which is configured to generate location data indicative of a geolocation associated with the communications device, retrieve, from a key that is obfuscated and stored in the communications device, the key, sign the location data with the retrieved key, and transmit request data to a communications server apparatus for requesting the authentication event, the request data comprising the signed location data. A method and a communications system for managing an authentication event are also provided.

NETWORK DATASET PROCESSING METHOD AND APPARATUS, COMPUTER DEVICE, AND STORAGE MEDIUM

Methods, devices, and non-transitory computer-readable storage media for network dataset processing are provided. An initial user interface in a terminal is generated. The initial user interface is configured to access a network dataset. A network dataset selected from the at least one network dataset is used as a target network dataset in response to selecting the at least one network dataset. A target virtual private network (VPN) node corresponding to the target network dataset is determined in response to an access operation on the target network dataset. An accelerated access channel between the terminal and the target network dataset is established through the target VPN node. The initial user interface is switched to an accelerated user interface. The network data processing information is displayed on the accelerated user interface. The network data processing information indicates that the accelerated access channel is used for accessing the target network dataset.

MODULAR DEVICE MESH NETWORK FOR ASSOCIATED DEVICE INTEGRATION

Embodiments of the present invention provide a system for facilitating a secure way to allow primary users and secondary users to perform interactions remotely via an automated machine and one or more auxiliary devices on the same local network. In particular, the system may assign exclusive control over an automated device and one or more auxiliary devices to a primary user via a computing device connected to the same local network or virtual private network as the automated machine, and may allow the primary user to communicate via the automated machine with a secondary user who wishes to complete one or more resource interactions.

Intelligent data protection

A technological approach can be employed to protect data. Datasets from distinct computing environments of an organization can be scanned to identify data elements subject to protection, such as sensitive data. The identified elements can be automatically protected such as by masking, encryption, or tokenization. Data lineage including relationships amongst data and linkages between computing environments can be determined along with data access patterns to facilitate understanding of data. Further, personas and exceptions can be determined and employed as bases for access recommendations.

Mobile device-based dual custody verification using micro-location

A method is provided. The method includes receiving a request to conduct a transaction with a merchant, requesting approval of the request, receiving approval of the request, verifying the transaction, receiving a first data, receiving a second data, determining a first distance between the first computing device and the second computing device based on the first and second data, determining that the first distance between the first computing device and second computing device satisfies a first predetermined distance threshold, receiving a third data, the third computing device being associated with the second user, determining a second distance between the third computing device and the second computing device based on the third and second data, determining that the second distance between the third computing device and the second computing device satisfies a second predetermined distance threshold, and approving the transaction.

Modifying security state with secured range detection

Some embodiments of the invention provide a method for a trusted (or originator) device to modify the security state of a target device (e.g., unlocking the device) based on a securing ranging operation (e.g., determining a distance, proximity, etc.). The method of some embodiments exchanges messages as a part of a ranging operation in order to determine whether the trusted and target devices are within a specified range of each other before allowing the trusted device to modify the security state of the target device. In some embodiments, the messages are derived by both devices based on a shared secret and are used to verify the source of ranging signals used for the ranging operation. In some embodiments, the method is performed using multiple different frequency bands.

Geographically secure access to container controller

An illustrative example embodiment of a controller associated with a container includes a processor and memory. The controller is configured to generate a derived key based on global positioning system information corresponding to a location of the controller. The controller uses the derived key to authenticate a user device.

Artificial reality collaborative working environments

Aspects of the present disclosure are directed to creating and administering artificial reality collaborative working environments and providing interaction modes for them. An XR work system can provide and control such artificial reality collaborative working environments to enable, for example, A) links between real-world surfaces and XR surfaces; B) links between multiple real-world areas to XR areas with dedicated functionality; C) maintaining access, while inside the artificial reality working environment, to real-world work tools such as the user's computer screen and keyboard; D) various hand and controller modes for different interaction and collaboration modalities; E) use-based, multi-desk collaborative room configurations; and F) context-based auto population of users and content items into the artificial reality working environment.