Abstract:
A method, apparatus, and system are provided for authentication of collaborative mobile devices. A first mobile device receives a challenge message, derives a first mobile device authentication result based on the challenge message, and conveys, to a second mobile device of a user of the first mobile device, a first short-range wireless signal comprising the challenge message. The second mobile device receives the challenge message from the first mobile device, derives a second mobile device authentication result based on the challenge message, and conveys, to the first mobile device, a first short-range wireless signal comprising the second mobile device authentication result. The first mobile device receives the second mobile device authentication result and authenticates one or more of the first mobile device, the second mobile device, and the user by conveying, to an authenticator device, the first mobile device authentication result and the second mobile device authentication result.
Abstract:
Systems for personalized intent prediction may perform a process including receiving image data depicting the behavior of a person on approach toward a secure location, generating intent data including data representing a current trajectory of the person on the current approach, comparing the intent data with a personal statistical model for the person that includes data representing trajectories associated with historical approaches by the person toward the secure location and respective result data indicating whether the historical approach resulted in the person entering the secure location, determining, dependent on the comparing, a personalized intent score representing a likelihood that the person intends to enter the secure location on the current approach, and pre-emptively enabling, or refraining from pre-emptively enabling, entry to the secure location prior to the person reaching the secure location based on whether the personalized intent score meets or exceeds a predetermined minimum confidence threshold for enabling entry.
Abstract:
Before hibernating a computing device (102), system software components (116) are notified of an upcoming hibernation process. The notifications are conveyed through an application program interface (API) (114). At least a portion of the system software components (116) can perform one or more pre-hibernation activities to place that system software component (116) in a ready-to-resume state. Each system software component indicates when it is ready for hibernation. Responsive to receiving the indication from each of the system software components (116), the hibernation process can complete. The completed hibernation process creates a snapshot (122) in nonvolatile memory. The snapshot (122) saves state information (124) for each of the system software components (116). The state information (124) is for the ready-to-resume state of the system software components (116). The computing device (102) can be restored after hibernation using a resume process (130), which reads the state (124) information from the snapshot (122).
Abstract:
Using sensor hubs for tracking an object. One system includes a first sensor hub and a second sensor hub. The first sensor hub includes a first audio sensor and a first electronic processor. In response to determining that one or more words captured by the first audio sensor is included in the list of trigger words, the first electronic processor generates a first voice signature of a voice of an unidentified person, generates a tracking profile, and transmits the tracking profile to the second sensor hub. The second sensor hub receives the tracking profile and includes a second electronic processor, a second audio sensor, and a camera. In response to determining that a second voice signature matches the first voice signature, the second electronic processor is configured to determine a visual characteristic of the unidentified person based on an image from the camera and update the tracking profile.
Abstract:
Before hibernating a computing device (102), system software components (116) are notified of an upcoming hibernation process. The notifications are conveyed through an application program interface (API) (114). At least a portion of the system software components (116) can perform one or more pre-hibernation activities to place that system software component (116) in a ready-to-resume state. Each system software component indicates when it is ready for hibernation. Responsive to receiving the indication from each of the system software components (116), the hibernation process can complete. The completed hibernation process creates a snapshot (122) in nonvolatile memory. The snapshot (122) saves state information (124) for each of the system software components (116). The state information (124) is for the ready-to-resume state of the system software components (116). The computing device (102) can be restored after hibernation using a resume process (130), which reads the state (124) information from the snapshot (122).
Abstract:
A device, system and method for evacuation task management is provided. A computing device: receives initial sensor data from sensors of a building; generates respective evacuation instructions for evacuating persons and objects from the building for each of responders, the respective evacuation instructions generated from rules for evacuating the building and the initial sensor data, each person or object associated with at least one of the sensors; transmits the respective evacuation instructions to a respective communication device of the responders; monitors updated sensor data from the sensors during evacuation of the building and location information associated with each of the responders, to track compliance with the respective evacuation instructions; and transmits updated respective evacuation instructions to the respective communication device of one or more of the responders, the updated respective evacuation instructions based on monitored updated sensor data and monitored location information received after transmitting the respective evacuation instructions.
Abstract:
Using sensor hubs for tracking an object. One system includes a first sensor hub and a second sensor hub. The first sensor hub includes a first audio sensor and a first electronic processor. In response to determining that one or more words captured by the first audio sensor is included in the list of trigger words, the first electronic processor generates a first voice signature of a voice of an unidentified person, generates a tracking profile, and transmits the tracking profile to the second sensor hub. The second sensor hub receives the tracking profile and includes a second electronic processor, a second audio sensor, and a camera. In response to determining that a second voice signature matches the first voice signature, the second electronic processor is configured to determine a visual characteristic of the unidentified person based on an image from the camera and update the tracking profile.
Abstract:
A method and apparatus for detecting that a stun gun has been deployed is provided herein. During operation a periodic nature of a stun-gun voltage will be utilized to determine if the stun-gun has been fired. More specifically, an electric/magnetic field (EMF) and/or a sound will be analyzed to determine if the periodic nature of the EMF and/or sound matches that of a stun gun. If so, a command center will be notified of the event. In order to increase the accuracy of any stun-gun detect, a gun-draw sensor may be used in combination with the above technique.
Abstract:
A method and system for pursuing a fugitive to a capture location. In one embodiment, the system including a main computer including a cornering strategy module. The main computer configured to communicate with a mapping module, a fugitive tracking and intelligence module, an asset tracking module, and a pursuit asset and receive ingress and egress information from the mapping module; predict a route of the fugitive; identify the capture location based on at least one selected from the group consisting of the received ingress and egress information and the predicted route; determine a cornering strategy based on the capture location and a cornering strategy function; and output instructions, based on the cornering strategy, to a pursuit asset in order to direct the fugitive toward the capture location.
Abstract:
Authentication methods are used to authenticate, a device1 having an ESN1 (electronic serial number), a device2 having an ESN2, and/or a user of the devices. In one implementation, device1 receives the ESN2 in a near-field signal; derives an authentication result as a function of the ESN1 and ESN2; and sends the authentication result to an authenticator device to use in completing authentication. Authentication is confirmed when the device1 authentication result matches an authentication result independently generated by the authenticator device, which is provisioned with the ESN1 and ESN2. In a second implementation, device1 generates a RAND1 (random number) and sends the RAND1 to device2 over a near-filed link. An authenticator device confirms authentication upon receiving the same RAND1 from both device1 and device2.