Leveraging an internet of things to initiate a physical object to perform a specific act that enhances security

    公开(公告)号:US10721204B2

    公开(公告)日:2020-07-21

    申请号:US16165205

    申请日:2018-10-19

    Abstract: An enterprise IoT concentrator can receive, from a first community IoT concentrator, first data corresponding to a security issue detected by at least one of a first plurality of devices located within a first physical environment, wherein the first plurality of devices are communicatively linked to one another within a first device domain that is a member of a first device community which includes the first community IoT concentrator. Responsive to receiving the first data, the enterprise IoT concentrator can process the first data to generate second data corresponding to the security issue. The second data can be configured to be processed by a second community IoT concentrator to initiate at least one device located within a second physical environment to perform a specific act that enhances security in the second physical environment. The enterprise IoT concentrator can communicate the second data to the second community IoT concentrator.

    DYNAMICALLY MANAGING DATA SHARING
    84.
    发明申请

    公开(公告)号:US20200028918A1

    公开(公告)日:2020-01-23

    申请号:US16584694

    申请日:2019-09-26

    Abstract: A computer-implemented method according to one embodiment includes receiving, at a server device, characteristics of a plurality of historical events from a plurality of client devices, receiving, at the server device, historical data sharing behavior associated with the plurality of historical events from the plurality of client devices, saving, by the server device, the characteristics of the plurality of historical events in association with the historical data sharing behavior, and automatically implementing, by the server device, one or more data sharing actions in response to an initialization of an event, utilizing the characteristics of the plurality of historical events and the historical data sharing behavior.

    Utilizing signatures to discover and manage derelict assets of an information technology environment

    公开(公告)号:US10353712B2

    公开(公告)日:2019-07-16

    申请号:US13887609

    申请日:2013-05-06

    Abstract: A set of asset signatures can be analyzed. Each asset signature can be associated with an asset. Derelict assets can be discovered based on the asset signatures. The asset can represent a fundamental structural unit of an information technology (IT) environment. A multi-stage screening process can be performed to discover derelict assets. In a first stage, assets having a normal state are able to be changed to a suspect state based on results of analyzing the corresponding asset signature. In a second stage, assets having a suspect state are able to be selectively changed in state to a normal state or to a derelict state. An asset management system record can be maintained for each of the set of assets. Each record of the asset management system can be a configuration item (CI), which indicates whether each of the set of assets is in a normal state, a suspect state, or a derelict state. The asset management system can periodically reclaim resources consumed by derelict assets.

    Framework for analysis of body camera and sensor information

    公开(公告)号:US10043085B2

    公开(公告)日:2018-08-07

    申请号:US15334018

    申请日:2016-10-25

    Abstract: A method, computer program product, and system for initiating a responsive action to environmental factors, include a processor monitoring biometric data and movements of an individual obtained from one or more sensors proximate to the individual, to establish and continuously update, a baseline state for the individual. The processor obtains video data and audio data from a recording device worn by the individual and contemporaneous data from the one or more sensors. The processor determines, based on the contemporaneous sensor data and the baseline state, that the individual is experiencing a state inconsistent with the baseline state. The processor analyzes the video data and the audio data to identify environmental factors contributing to the state inconsistent with the baseline state. Based on identifying the environmental factors, the processor determines a responsive action to mitigate the environmental factors and initiates the responsive action.

Patent Agency Ranking