INTRUSION MOVEMENT PREDICTION
    1.
    发明公开

    公开(公告)号:US20230343196A1

    公开(公告)日:2023-10-26

    申请号:US17660662

    申请日:2022-04-26

    IPC分类号: G08B13/20

    CPC分类号: G08B13/20

    摘要: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

    Intrusion movement prediction
    2.
    发明授权

    公开(公告)号:US11790744B1

    公开(公告)日:2023-10-17

    申请号:US17660662

    申请日:2022-04-26

    IPC分类号: G08B13/20

    CPC分类号: G08B13/20

    摘要: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.

    CARD SKIMMING DETECTION
    3.
    发明申请

    公开(公告)号:US20230129964A1

    公开(公告)日:2023-04-27

    申请号:US17508081

    申请日:2021-10-22

    IPC分类号: G07F19/00 G06Q20/10

    摘要: A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.

    KEYPAD SECURITY
    4.
    发明申请

    公开(公告)号:US20230126452A1

    公开(公告)日:2023-04-27

    申请号:US17508023

    申请日:2021-10-22

    IPC分类号: G06F21/55 H04N7/18

    摘要: A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.

    Anomaly detection based on airflow alerters

    公开(公告)号:US11585557B2

    公开(公告)日:2023-02-21

    申请号:US16918677

    申请日:2020-07-01

    摘要: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.

    Anomaly detection based on airflow measurement

    公开(公告)号:US11512861B2

    公开(公告)日:2022-11-29

    申请号:US16918655

    申请日:2020-07-01

    IPC分类号: F24F11/32 F24F11/64 F24F5/00

    摘要: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor, the method including: receiving, by the processor, a real-time airflow pattern detected from an airflow alerter, wherein the real-time airflow pattern is generated by a heating, ventilation, and air conditioning (HVAC) system in a particular facility; comparing, by the processor, the real-time airflow pattern to a predetermined airflow pattern for the HVAC system; and when the real-time airflow pattern is different from the predetermined airflow pattern, receiving, by the processor, an alert message indicating an anomaly from the airflow alerter.

    MANAGING ENTERPRISE DATA RETENTION

    公开(公告)号:US20220019685A1

    公开(公告)日:2022-01-20

    申请号:US16930266

    申请日:2020-07-15

    IPC分类号: G06F21/62 G06F11/30

    摘要: Aspects of the present invention disclose a method, computer program product, and system for managing data based on updates to data management policies. The method includes one or more processors monitoring data sources for updates to data management policies that apply to an organization. In response to identifying an update to a data management policy that applies to the organization, the method further includes one or more processors generating a data management rule based on the update to the data management policy. The data management rule includes a defined action to take on data records that correspond to a defined characteristic. The method further includes one or more processors identifying a first set of data records that include the defined characteristic of the rule. The method further includes one or more processors performing the defined action of the rule on the first set of data records.

    PROTECTING A SYSTEM FROM ATTACK VIA A DEVICE ATTACHED TO A USB PORT

    公开(公告)号:US20220019549A1

    公开(公告)日:2022-01-20

    申请号:US16930738

    申请日:2020-07-16

    摘要: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.