Installable mutable intelligent security package and security system in Internet of Things networks

    公开(公告)号:US12126634B2

    公开(公告)日:2024-10-22

    申请号:US18090569

    申请日:2022-12-29

    CPC classification number: H04L63/1416 G06F8/62 H04L63/0869 H04L67/12 G16Y30/10

    Abstract: Concepts and technologies disclosed herein are directed to an installable mutable intelligent security package (“IMISP”) and security system in Internet of Things (“IoT”) networks. According to one aspect disclosed herein, an IoT device can receive an IMISP. The IMISP can scan a plurality of memory locations of the memory for an IMISP operating system process. In response to finding the IMISP operating system process in a memory location of the plurality of memory locations, the IMISP and the IMISP operating system process can conduct a mutual authentication process. In response to a successful result of the mutual authentication process, the IMISP can self-install in the memory location. The IMISP can then scan the memory of the IoT device for an anomaly. In response to finding the anomaly, the IMISP can generate a report that includes information associated with the anomaly.

    SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR SOFTWARE DEFINED STORAGE SECURITY PROTECTION

    公开(公告)号:US20230168816A1

    公开(公告)日:2023-06-01

    申请号:US18160116

    申请日:2023-01-26

    CPC classification number: G06F3/0622 G06F3/0673 G06F3/0653 G06F21/31

    Abstract: A system is provided with a software controller; a storage platform capable of storing stored blocks of data and having a central processing unit; a controller monitoring and isolation tool embedded in the software controller; and a storage monitoring and isolation tool embedded in the storage platform that is capable of locking down a memory partition on the storage platform. The system also includes a memory for storing computer instructions and a host computer coupled with the memory, wherein the host computer, responsive to executing the computer instructions, performs certain operations. The operations include extracting orchestration configurations through the controller monitoring and isolation tool and relaying the orchestration configurations to the storage monitoring and isolation tool. The operations include correlating using the controller monitoring and isolation tool and the storage monitoring and isolation tool actual locations for incoming data for a customer, and monitoring performance of the storage platform with the storage monitoring and isolation tool. The operations also include tying the stored blocks of data to a physical memory on which the stored blocks of data reside; and providing a passcode to the customer though the controller monitoring and isolation tool that has to be presented to the controller monitoring and isolation tool and the storage monitoring and isolation tool to store data.

    Method and apparatus for generating virtual objects

    公开(公告)号:US11386654B2

    公开(公告)日:2022-07-12

    申请号:US17174379

    申请日:2021-02-12

    Abstract: Aspects of the subject disclosure may include, for example, obtaining a first request for a first virtual object, obtaining first data regarding the first virtual object responsive to the obtaining of the first request, analyzing the first data to identify a first plurality of characteristics for the first virtual object, wherein the first plurality of characteristics include a first visual aspect of the first virtual object, a first auditory aspect of the first virtual object, a first scent aspect of the first virtual object, and a first haptic aspect of the first virtual object, and responsive to the analyzing of the first data, enabling at least a first sensory unit of a plurality of sensory units to render the first virtual object in accordance with the first plurality of characteristics. Other embodiments are disclosed.

    Protecting user data during audio interactions

    公开(公告)号:US11349983B2

    公开(公告)日:2022-05-31

    申请号:US16921854

    申请日:2020-07-06

    Abstract: A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

    Secure data storing and retrieval system and method

    公开(公告)号:US11329813B2

    公开(公告)日:2022-05-10

    申请号:US16679947

    申请日:2019-11-11

    Abstract: Aspects of the subject disclosure may include, for example, a processing system including a processor; and a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations including: dividing data provided for storage into data segments; encrypting each data segment of the data segments with an encryption key, thereby creating encrypted data slices; arranging a cluster of sectorized servers in an ordered list of sectorized servers; selecting a first sectorized server from the ordered list of sectorized servers; generating an access key; and sending a first encrypted data slice of the encrypted data slices and the access key to the first sectorized server, wherein the first sectorized server stores the first encrypted data slice in a sector of the first sectorized server, and retrieves the first encrypted data slice from the sector upon presentation of the access key. Other embodiments are disclosed.

    VIDEO COMMUNICATION DATA SECURITY
    27.
    发明申请

    公开(公告)号:US20220078173A1

    公开(公告)日:2022-03-10

    申请号:US17454991

    申请日:2021-11-15

    Abstract: A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.

    PROTECTING USER DATA DURING AUDIO INTERACTIONS

    公开(公告)号:US20220006898A1

    公开(公告)日:2022-01-06

    申请号:US16921854

    申请日:2020-07-06

    Abstract: A method for protecting user data during an audio interaction includes various operations performed by a processing system including at least one processor. In one example, the operations include detecting an audio signal that is part of an interaction between a user and another party, converting the audio signal into a string of text, detecting that the interaction is likely to put sensitive data of the user at risk, based on a comparison of the string of text to a library of interactions that are known to put sensitive data at risk, and sending an alert to notify the user that the interaction is likely to put the sensitive data of the user at risk, wherein the alert is sent to prevent the user from providing the sensitive data to the another party, and wherein the method is performed contemporaneously with an occurrence of the interaction.

    PROJECTING VIRTUAL PRESENCES ALONG A MOVING TRAJECTORY

    公开(公告)号:US20210390779A1

    公开(公告)日:2021-12-16

    申请号:US16898131

    申请日:2020-06-10

    Abstract: In one example, a method performed by a processing system includes controlling a first device in a first location to project a virtual presences in a current field of view of a subscriber of a virtual presence projection service, computing a moving trajectory of the subscriber from the first location to a second location, identifying a second device that is located along the moving trajectory, wherein the second device includes a second set of resources for projecting virtual presences, and wherein the second device is registered with the virtual presence projection service to lend the second set of resources to subscribers of the virtual presence projection service, and controlling the second device to project the virtual presence in the current field of view of the subscriber when the subscriber is no longer within range of the first device but is within range of the second device.

    PERSONAL CONVERSATIONALIST SYSTEM
    30.
    发明申请

    公开(公告)号:US20210294977A1

    公开(公告)日:2021-09-23

    申请号:US16825023

    申请日:2020-03-20

    Abstract: A personal conversationalist system includes a processor, and a computer-readable medium storing instructions which, when executed by the processor, cause the processor to operations that include receiving a first data input feed, accessing a first user profile that is as associated with a first user, detecting a conversation event when first data in the first data input feed satisfies a first conversation event condition, generating a first conversationalist persona based on the conversation event, the first user profile, and data provided in the first data input feed; and initiating a first conversation session via the first conversationalist persona by outputting a first conversationalist persona response that is based on the conversation event, the first user profile, and the data provided in the first data input feed.

Patent Agency Ranking