Providing and using a user login protection service

    公开(公告)号:US12126724B2

    公开(公告)日:2024-10-22

    申请号:US17951184

    申请日:2022-09-23

    CPC classification number: H04L9/3226 H04L9/3247

    Abstract: Providing and using a user login protection service can include detecting, during a login creation process, input that indicates that a computing device has opted-in for protection for a login being created. During the login creation process, the login can be stored at a first data storage location, the login including an address that identifies a location of a distributed ledger and a password, and a reset password at a second data storage location comprising a secure data storage device. In response to detecting an attempt to log in to the third party device to access the resource, a value associated with the distributed ledger can be obtained, the value indicating a status of a trigger condition associated with the login. If the value is zero, the attempt to log in can be allowed to proceed. If the value is one, the attempt to log in can be blocked.

    Universal Conceptual Control Management
    72.
    发明公开

    公开(公告)号:US20240223567A1

    公开(公告)日:2024-07-04

    申请号:US18089890

    申请日:2022-12-28

    CPC classification number: H04L63/102 H04L63/105

    Abstract: According to one aspect of the concepts and technologies disclosed herein, a system can separate permissions, rules, and controls into a discrete intermediate layer of a universal conceptual control management hierarchy as control objects. The system can define at least one interaction for each of the control objects. The system can assign resources to the control objects. A first control object of the control objects can be a low-level control object that encompasses the at least one interaction with a specific resource of the resources. A second control object of the control objects can be a sub-object of the first control object. The second control object can have a restriction. The restriction can be applied on top of the second control object. The restriction alternatively can be chained to the second control object with an additional restriction.

    ANNOTATED INCIDENT RECREATION
    74.
    发明公开

    公开(公告)号:US20240086463A1

    公开(公告)日:2024-03-14

    申请号:US17931389

    申请日:2022-09-12

    CPC classification number: G06F16/7867 G06V20/41 G06V20/46

    Abstract: The disclosed technology is directed towards generating an annotated visual playback of an incident. Upon obtaining notification of an incident, event data occurring in the incident zone and timeframe are obtained (e.g., collected) from sensors proximate the zone. The event data is used to annotate a visual playback captured by one or more cameras, e.g., within a timeframe ranging from some time before the incident occurred to the end of the incident. For example, a video can be presented with overlaid annotation data, each annotation describing an event as it occurred in time, in conjunction with an advancing timestamp overlay showing the time of the video frames. A simulated video, e.g., extended reality video, can also be generated, along with annotations and timeframe data, such as if captured from camera(s) from one or more various different perspectives.

    Providing and Using a Monitoring Service
    75.
    发明公开

    公开(公告)号:US20240071189A1

    公开(公告)日:2024-02-29

    申请号:US17899746

    申请日:2022-08-31

    CPC classification number: G08B13/196 G06V20/40 G06V20/52 H04N7/188

    Abstract: Providing and using a monitoring service can include detecting a monitoring trigger that indicates that monitoring of a user device is to be initiated. A time period associated with the monitoring can be identified. The monitoring of the user device can be triggered, where the monitoring can include obtaining video associated with the user device that is streamed to an edge device, wherein the video can be analyzed to determine if a threat is detected. If a determination is made that the threat is not detected, termination of the monitoring and deletion of the video can be triggered. If a determination is made that the threat is detected, delivery of an alert to another device can be triggered.

    METHODS, SYSTEMS, AND DEVICES FOR PROVIDING LOCAL SERVICES THROUGH A COMMUNITY SOCIAL MEDIA PLATFORM

    公开(公告)号:US20230308830A1

    公开(公告)日:2023-09-28

    申请号:US17701786

    申请日:2022-03-23

    CPC classification number: H04W4/023 G06Q50/01 H04W4/029 G06K7/1417

    Abstract: Aspects of the subject disclosure may include, for example, obtaining an image of a code from a first mobile device associated with a first user. The code is associated with a community social media platform. Further embodiments can include allowing the first mobile device access to the community social media platform in response to validating that the first user is associated with a community associated with the community social media platform, and obtaining a request from the first mobile device for a service. Additional embodiments can include identifying a second mobile device associated with a second user based on the second user providing the service, and providing a message to the second mobile device indicating the second user perform the service for the first user. Other embodiments are disclosed.

    LOCALIZED AUTHORIZATION FOR SECURE COMMUNICATION

    公开(公告)号:US20230096372A1

    公开(公告)日:2023-03-30

    申请号:US17485773

    申请日:2021-09-27

    Inventor: Wei Wang

    Abstract: A system for localized authorization for secure communication may include sending a request to provide authorization of local communication for one or more devices to use a data service. The one or more devices may be determined based on a location proximate to the apparatus. A device may request resources on behalf of one or more devices upon successful authentication of itself. A system can provide a one-time or temporary agreement after multiple devices agree on a contract upon authenticating with the network.

    Encoding and concealing information using deep learning

    公开(公告)号:US11443057B2

    公开(公告)日:2022-09-13

    申请号:US16662779

    申请日:2019-10-24

    Abstract: Aspects of the subject disclosure may include, for example, a method for training a deep learning model that includes encoding a content item; generating a blended image by combining a background image and the encoded content; decoding the blended image to generate decoded content corresponding to the content item; and defining or specifying a loss function related to the deep learning model. The method also includes determining values of training parameters for the deep learning model to minimize the loss function, thereby obtaining a trained deep learning model. The method also includes an information concealing procedure using the trained deep learning model to conceal user content by encoding the user content and blending the encoded user content with a user-selected image; the information concealing procedure is substantially independent of the user-selected image. Other embodiments are disclosed.

    SOCIAL ENGINEERING ATTACK PREVENTION

    公开(公告)号:US20210185080A1

    公开(公告)日:2021-06-17

    申请号:US16710331

    申请日:2019-12-11

    Abstract: In one example, the present disclosure describes various methods, computer-readable media, and apparatuses for supporting social engineering attack prevention based on early detection and remediation of various types of social engineering attacks which may be initiated within various contexts. In one example, supporting social engineering attack prevention may include identifying a workflow to be protected, identifying, for the workflow, a set of valid resources of the workflow where the set of valid resources includes a set of artifacts and a set of templates, identifying, from a dataset associated with the workflow and based on the set of artifacts, a communication associated with the workflow, determining, based on an analysis of the communication based on the set of templates, that the communication is malicious, and initiating, based on the determination that the communication is malicious, a remediation action.

Patent Agency Ranking