Identification of database intrusion by changes in data tables

    公开(公告)号:US11379576B2

    公开(公告)日:2022-07-05

    申请号:US16910794

    申请日:2020-06-24

    Abstract: Aspects described herein may allow for the application of an artificial neural network architecture to identify intrusion in a database. Changes to components of a data table of the database may be tracked as a snapshot of the changes over a period of time. Any change in the data table may be associated with a user. Utilizing multiple snapshots, a background substitution technique may be utilized to generate a matrix of the changes to the data table over a period of time. A model having an artificial neural network architecture may utilize the matrix as an input set to identify the user as an unauthorized user accessing the database.

    VEHICLE DEVICE AUTHORIZATION
    72.
    发明申请

    公开(公告)号:US20220179936A1

    公开(公告)日:2022-06-09

    申请号:US17111056

    申请日:2020-12-03

    Abstract: One embodiment provides a method, including: receiving, at an information handling device positioned within a vehicle, a command from a vehicle occupant to initiate a function; transmitting, responsive to the receiving and prior to initiation of the function, an authorization request to a secondary device designated as an authorization authority; determining, using a processor, whether confirmation of the authorization request is received from the secondary device; and initiating, responsive to determining that confirmation of the authorization request is received from the secondary device, the function. Other aspects are described and claimed.

    Wearable computing device secure access badge

    公开(公告)号:US11341223B1

    公开(公告)日:2022-05-24

    申请号:US16704872

    申请日:2019-12-05

    Abstract: Techniques are described for enabling a user to access a secure system based on vital signs of the user that are collected by a wearable device worn by the user. The vital signs of the user may be used as an extra level of security when accessing the secure system. For example, a computing device may automatically validate that a user requesting access to a secure system is a person and not a robot based on receipt of vital signs of the user. As another example, a computing device may operate as a secure access badge that first analyzes vital signs of a user to confirm that the user is not in distress before sending an access signal to gain access to a secure system. In either example, the computing device may be a wearable device, or be paired to a wearable device to receive the vital signs.

    OUTPUT SYSTEM, INFORMATION PROCESSING SYSTEM, AND AUTHENTICATION METHOD

    公开(公告)号:US20220129215A1

    公开(公告)日:2022-04-28

    申请号:US17500943

    申请日:2021-10-14

    Abstract: An output system includes circuitry to generate information on a character string in response to an authentication request including user identification information transmitted from an output apparatus. The circuitry further transmits the information on the character string to an information processing device. In response to receiving the information on the character string and the user identification information from the output apparatus that has received the information on the character string and the user identification information from the information processing device, the circuitry further performs authentication for a user identified by the user identification information, based on the information on the character string and the user identification information, and transmits an authentication result to the output apparatus.

    REAL-TIME ADAPTIVE FACILITY DEPLOYMENT

    公开(公告)号:US20220116756A1

    公开(公告)日:2022-04-14

    申请号:US17560648

    申请日:2021-12-23

    Applicant: GOOD2GO, INC.

    Inventor: Frances Heller

    Abstract: A system allows an end-user to locate and gain access to an access-controlled facility or resource, such as a restroom, phone charging station, or Wi-Fi hot spot. Some implementations of the system monitor the formation and concentration of individuals into crowds that may place a higher demand on facilities and resources located near the crowd. The system may distribute mobile facilities to areas that offer convenient access to potential developing crowds, and when the system determines that there is a disparity between available resources and crowd demand reaches a certain level it may deploy one or more mobile facilities to positions proximate to that crowd. A mobile facility may also be requested on demand by a user or organizer, and some implementations provide cost sharing mechanisms and other user benefits related to requesting and accessing the facility.

    METHOD AND DEVICE FOR COMPARING PERSONAL BIOLOGICAL DATA OF TWO USERS

    公开(公告)号:US20220083638A1

    公开(公告)日:2022-03-17

    申请号:US17532493

    申请日:2021-11-22

    Abstract: A computer-implemented method of comparing one or more genetic traits of two users. Each user has a wearable device storing data indicative of the one or more genetic traits, the data having been obtained by an analysis of a biological sample provided by the user. The method comprises: transmitting the data indicative of the one or more genetic traits from a first of the wearable devices to a first computer device using a short-range wireless data connection; transmitting the data from the first computer device to a second computer device over a data network; transmitting the data from the second computer device to a second of the wearable devices over a short-range wireless data connection; and comparing the data from the first wearable device with the data stored on the second wearable device to determine whether there is a match between the users' one or more genetic traits.

    Enabling access to data
    80.
    发明授权

    公开(公告)号:US11275821B2

    公开(公告)日:2022-03-15

    申请号:US16575795

    申请日:2019-09-19

    Inventor: Boris Taratine

    Abstract: Systems, methods and apparatus for enabling access to secure data. A first module is arranged to generate a limited use passcode and make the passcode available to a user. A second module and a third module are arranged to communicate whereby to enable detection of the third module being in proximity to the second module. A fourth module is arranged to receive a passcode via user input. The apparatus is arranged to enable access to secure data in dependence on the fourth module receiving a valid passcode generated by the first module and the third module being in proximity to the second module.

Patent Agency Ranking