-
公开(公告)号:US11936790B1
公开(公告)日:2024-03-19
申请号:US17956190
申请日:2022-09-29
申请人: T STAMP INC.
CPC分类号: H04L9/3231 , G06F7/483 , G06F7/58 , G06K19/06037 , H04L9/3242
摘要: Systems and methods for enhanced hash transforms are disclosed. In particular embodiments, biometric data is concatenated with non-biometric data for generating a fixed-sized vector, and furthermore performing various permutations and projections on the vector. The resulting vector may be stored in a registry, and a corresponding key may be generated and provided to the user associated with the biometric data. The hash transformation may be a lossy process, such that the resulting hash includes less bytes than the initial biometric data, and a hash reversal fails to generate an exact copy of the original biometric data.
-
公开(公告)号:US11877644B2
公开(公告)日:2024-01-23
申请号:US17352855
申请日:2021-06-21
申请人: Mark Altschuler
发明人: Mark Altschuler
CPC分类号: A46B17/065 , B08B1/001 , B08B3/08 , A46B9/04 , A46B17/06 , A46B2200/1066 , A46B2200/202 , A46B2200/205
摘要: In various embodiments, the device may be used to clean any brush. The brush bristles carry bacteria, food particles, dust, germs, and other similar residue in tightly packed spaces near where the bristles connect with the head of the brush. In multiple embodiments, the device is a container that is filled with cleaning solution (e.g., mouthwash, cleaning solution, alcohol, etc.), a lid that substantially closes the top opening of the container, and an agitator pad that has a plurality of individual prongs. In various embodiments, the lid mirrors the container shape so that the lid and the container can be operatively connected. In various embodiments, the lid has a cover, so that when the device is not being use, the cover may be put in a closed position so that the cover closes the opening in the lid.
-
公开(公告)号:US11859350B2
公开(公告)日:2024-01-02
申请号:US18182011
申请日:2023-03-10
发明人: Daniel W. Plonk , Michael E. Vawter , Greg Temple
摘要: Systems, devices, media, and methods are presented for controlling remote equipment in a network. A switch heater control system includes a weather modeling function. The system periodically obtains weather data according to a predetermined time interval. Based on the closest weather data set, the weather modeling function generates a hyperlocal forecast associated with each switch heater location. The system includes an active snowfall mode and a maintenance mode that controls heating based on an estimate of local snow depth, adjusted for wind conditions and passing trains. When the hyperlocal forecast indicates heating is required, the system calculates a melt duration, starts a timer, and transmits a start signal to the switch heater.
-
公开(公告)号:US11845400B2
公开(公告)日:2023-12-19
申请号:US17391707
申请日:2021-08-02
发明人: David E. Moeller , Rahul Maran , Aditya Chavan
IPC分类号: G01P13/00 , B60R25/31 , B60R11/00 , B60R25/30 , B60R25/102 , B60R25/33 , B60R25/10 , B60R1/00 , G01V11/00 , G06F21/57 , B60R25/25 , B60R25/34 , G01B17/00 , G01J5/00 , B60R25/24 , G06F3/01 , G06F3/16 , G06F8/65 , G06Q20/10 , G06Q20/32 , G06Q20/40 , G06Q30/0601 , H04L9/06 , H04L9/08 , H04L9/32 , H04W4/021 , B60R25/32 , G06T7/174 , B60R25/04 , G07C9/00 , B60R25/40 , G08B21/18 , G06V20/59 , G06V40/16 , H04L51/224
CPC分类号: B60R25/31 , B60R1/00 , B60R25/102 , B60R25/1009 , B60R25/305 , B60R25/33 , G01V11/002 , G06F21/572 , B60R11/00 , B60R25/04 , B60R25/1003 , B60R25/1004 , B60R25/1018 , B60R25/1025 , B60R25/24 , B60R25/245 , B60R25/25 , B60R25/307 , B60R25/32 , B60R25/34 , B60R25/403 , B60R25/406 , B60R2011/0007 , B60R2025/0405 , B60R2025/1013 , B60R2300/103 , B60R2300/8006 , B60R2300/8073 , B60R2325/10 , B60R2325/101 , B60R2325/103 , B60R2325/20 , B60R2325/205 , G01B17/00 , G01J5/0025 , G01P13/00 , G06F3/017 , G06F3/167 , G06F8/65 , G06Q20/102 , G06Q20/3278 , G06Q20/40145 , G06Q30/0635 , G06T7/174 , G06T2207/10016 , G06V20/59 , G06V40/172 , G07C9/00182 , G07C2009/0019 , G07C2009/00396 , G07C2009/00539 , G07C2009/00769 , G07C2009/00984 , G08B21/182 , H04L9/0643 , H04L9/0869 , H04L9/3231 , H04L51/224 , H04L2209/84 , H04W4/021
摘要: A vehicle theft-prevention system can include a mobile application that can determine a location of the mobile device. One or more computing devices can be in communication with the mobile application via a network. The mobile application and the at least one computing device configured to determine that the location of the mobile device has moved outside of a geofence associated with a vehicle theft-prevention apparatus. The mobile application and the at least one computing device can cause the vehicle theft-prevention apparatus to change from an unarmed mode to an armed mode.
-
公开(公告)号:US11797664B2
公开(公告)日:2023-10-24
申请号:US17184158
申请日:2021-02-24
申请人: Avecto Limited
IPC分类号: G06F9/445 , G06F21/53 , G06F21/57 , G06F21/51 , G06F21/62 , H04L9/40 , G06F9/455 , G06F21/31
CPC分类号: G06F21/51 , G06F9/445 , G06F9/44521 , G06F9/45529 , G06F21/53 , G06F21/57 , G06F21/6281 , H04L63/102 , G06F21/31 , G06F2221/2103 , G06F2221/2141
摘要: A computer device, including at least a processor and a memory, can be configured to control process components on a computer device. An agent can intercept a request to instantiate a new process component in a user account of a logged-in user. The request can originate on the computing device from an instance of a particular process component amongst a set of process components. The user account can be assigned default user privileges by a privilege access management service. The agent can determine whether to permit the intercepted request. The agent can permit the intercepted request if the relationship is validated and if a trusted owner is identified amongst the set of identified owners.
-
16.
公开(公告)号:US11782911B1
公开(公告)日:2023-10-10
申请号:US17476102
申请日:2021-09-15
申请人: Ionic Security Inc.
发明人: Ryan Mark Speers , Adam Ghetti , Brian Michael Vohaska , Jeremy Michael Eckman , Katrina Jean Ray , Jonathan Thomas Burns
IPC分类号: G06F16/242 , G06F16/23 , G06F21/60
CPC分类号: G06F16/2425 , G06F16/2365 , G06F21/602
摘要: Systems and methods are disclosed that receive a search request with one or more data items to search against filters. Masked versions of the data items are generating using a first predetermined algorithm. The masked versions can be transmitted to another computing device to be secured. Query data can be generated by applying a second algorithm to the secured version of the data items. The query data can be transmitted to a storage system to query the filters to identify search results.
-
公开(公告)号:US11747792B1
公开(公告)日:2023-09-05
申请号:US18167522
申请日:2023-02-10
IPC分类号: G05B19/418 , H04L61/2517 , H04L69/16
CPC分类号: G05B19/41855 , H04L61/2517 , H04L69/162
摘要: Systems and methods are disclosed for remotely updating configuration logic on Internet of Things (IoT) devices located physically proximate to industrial systems equipment. The IoT devices are configured to monitor and detect outputs, such as sensor data, corresponding to the industrial systems equipment, and the IoT devices are further configured to operate as gateway devices through which communications are routed between a remote computing system and the industrial systems equipment. The IoT devices operate according to configuration files generated at the remote computing system and transmitted to the IoT devices. The IoT devices are notified by the remote computing system of subsequent updates to their respective configuration files. Responsive to receiving a configuration file update notice, an IoT device may establish a back-channel communication link to the remote computing system across which the updated configuration file is identified and retrieved based at least on an updated timestamp.
-
公开(公告)号:US11734566B2
公开(公告)日:2023-08-22
申请号:US17875900
申请日:2022-07-28
申请人: Cangrade, Inc.
发明人: Steven Lehr , Gershon Goren , Liana Epstein
IPC分类号: G06N3/08 , G06Q10/06 , G06Q10/0639
CPC分类号: G06N3/08 , G05B2219/33044 , G06Q10/06398
摘要: A hardware processor can receive sets of input data describing assets associated with an entity. The hardware processor can receive inputs responsive to queries of a user. The hardware processor can individually generate predictive models based on a respective set of input data. The hardware processor can calculate predicted outcomes for the user by applying each of models to the inputs. The hardware processor can generate a user interface comprising the predictive outcomes for the user for each of the predictive models.
-
公开(公告)号:US11728013B2
公开(公告)日:2023-08-15
申请号:US14333132
申请日:2014-07-16
申请人: InteliChart, LLC
发明人: Christopher John Boston , Gary Robert Hamilton , Robert George Hamilton , Charles David Myers , William Francis Plourde , Ruben Dario Sosa
IPC分类号: G16H10/60
CPC分类号: G16H10/60
摘要: Aspects of the present disclosure generally relate to systems and methods for accessing, managing, and exchanging patient information across a plurality of providers that may have various discrete medical record systems, including, but not limited to medical facilities, clinics, ambulatory emergency health systems, and other providers (e.g., heterogeneous healthcare providers). In various embodiments, the system receives a request from a requesting party for one or more records of a particular patient. In response, in one or more embodiments, the system identifies what information (if any) the requester is authorized to receive, retrieves the information the requester is authorized to receive from various discrete medical record systems, then normalizes and aggregates the retrieved information. In a particular embodiment, the system also denormalizes the data (e.g., converts the data to the local format and terms of the requester) before transmitting the retrieved data to the requester.
-
20.
公开(公告)号:US11726993B1
公开(公告)日:2023-08-15
申请号:US17476106
申请日:2021-09-15
申请人: Ionic Security Inc.
发明人: Ryan Mark Speers , Adam Ghetti , Brian Michael Vohaska , Jeremy Michael Eckman , Katrina Jean Ray , Jonathan Thomas Burns
IPC分类号: G06F16/242 , G06F16/23 , G06F21/60
CPC分类号: G06F16/2425 , G06F16/2365 , G06F21/602
摘要: Systems and methods are disclosed that receive data at an electronic computing device. A first algorithm can be applied to the phrases to generate masked versions of the phrases. The masked versions can be cryptographically secured using a second algorithm and a cryptographic key. The second algorithm and cryptographic key can be used to generate a secured versions of the phrases. A filter representative of the data can be generated using the secured versions of the phrases.
-
-
-
-
-
-
-
-
-