System and method for generating data regarding a vehicle crash

    公开(公告)号:US11238678B2

    公开(公告)日:2022-02-01

    申请号:US16949097

    申请日:2020-10-13

    Abstract: A method for generating data regarding a vehicle crash includes receiving initial sensor data, determining that the initial sensor data includes sensor data indicating a crash has occurred, receiving additional sensor data; and generating combined sensor data. A computing device for generating data regarding a vehicle crash includes a processor and a memory including instructions that when executed cause the processor to receive initial sensor data, determine that the initial sensor data includes sensor data indicating that a crash has occurred, receive additional sensor data; and generate combined sensor data. A computer readable storage medium includes non-transitory computer readable instructions stored thereon for generating data regarding a crash, wherein the instructions when executed cause a processor to receive initial sensor data; receive additional sensor data, determine that the initial sensor data includes sensor data indicating that a crash has occurred; and generate combined sensor data.

    System and method for generating vehicle crash data

    公开(公告)号:US11037384B1

    公开(公告)日:2021-06-15

    申请号:US16439693

    申请日:2019-06-12

    Abstract: A computer-implemented method for generating vehicle crash data is presented. It may be determined whether a first mobile computing device has detected that a crash of a vehicle has occurred. It may also be determined whether a second mobile computing device(s) has detected that the crash has occurred. Sensor data output by at least one sensor of the first mobile computing device and/or the second mobile computing device(s) may be received when it is determined that the first mobile computing device and/or the second mobile computing device(s) has detected that the crash has occurred. Vehicle crash data may be generated based on such sensor data, and may include an initial confirmation that the crash has occurred, an indication of crash severity, an indication of a number of vehicle occupants, and/or an indication that the crash has not occurred.

    System and Method for Generating Data Regarding a Vehicle Crash

    公开(公告)号:US20210027555A1

    公开(公告)日:2021-01-28

    申请号:US16949097

    申请日:2020-10-13

    Abstract: A method for generating data regarding a vehicle crash includes receiving initial sensor data, determining that the initial sensor data includes sensor data indicating a crash has occurred, receiving additional sensor data; and generating combined sensor data. A computing device for generating data regarding a vehicle crash includes a processor and a memory including instructions that when executed cause the processor to receive initial sensor data, determine that the initial sensor data includes sensor data indicating that a crash has occurred, receive additional sensor data; and generate combined sensor data. A computer readable storage medium includes non-transitory computer readable instructions stored thereon for generating data regarding a crash, wherein the instructions when executed cause a processor to receive initial sensor data; receive additional sensor data, determine that the initial sensor data includes sensor data indicating that a crash has occurred; and generate combined sensor data.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US11044255B1

    公开(公告)日:2021-06-22

    申请号:US16375040

    申请日:2019-04-04

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to the same security group. Nodes of the graph data structure may be clustered to indicate that each of the users in the cluster belong to the same security group. Moreover, the users who are connected to multiple clusters may be identified as a potential risk of having unauthorized access to secure data files. The authorized access may then be remedied or taken away.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US10320802B1

    公开(公告)日:2019-06-11

    申请号:US15834626

    申请日:2017-12-07

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to the same security group. Nodes of the graph data structure may be clustered to indicate that each of the users in the cluster belong to the same security group. Moreover, the users who are connected to multiple clusters may be identified as a potential risk of having unauthorized access to secure data files. The authorized access may then be remedied or taken away.

    Method and system for identifying security risks using graph analysis

    公开(公告)号:US09876801B1

    公开(公告)日:2018-01-23

    申请号:US15611026

    申请日:2017-06-01

    CPC classification number: H04L63/104

    Abstract: Methods, systems, apparatus, and non-transitory computer readable media are described for identifying users who are likely to have unauthorized access to secure data files in an organizational network. Various aspects may include presenting the identified users on a display for a system administrator and/or security analyst to resolve. For example, the display may include a graph data structure with users represented as nodes and connections between users represented as edges. Each connection may be a pair of users belonging to a same security group. Nodes of the graph data structure may be clustered according to a clustering coefficient. Moreover, the graph data structure display may be organized and color coded in such a manner, that a system administrator and/or security analyst may quickly and easily view the users who are most likely to have unauthorized access to secure data files. The authorized access may then be remedied or taken away.

Patent Agency Ranking