-
公开(公告)号:US20230343196A1
公开(公告)日:2023-10-26
申请号:US17660662
申请日:2022-04-26
IPC分类号: G08B13/20
CPC分类号: G08B13/20
摘要: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.
-
公开(公告)号:US11790744B1
公开(公告)日:2023-10-17
申请号:US17660662
申请日:2022-04-26
IPC分类号: G08B13/20
CPC分类号: G08B13/20
摘要: According to one embodiment, a method, computer system, and computer program product for intrusion movement prediction is provided. The embodiment may include receiving environmental sensor data corresponding to a monitored space as captured by a plurality of sensors affixed to an airflow component. The embodiment may also include generating a three-dimensional model of the monitored space using the received environmental data. The method may further include, in response to determining a disturbance is present in the three-dimensional model, performing a security action.
-
公开(公告)号:US20230129964A1
公开(公告)日:2023-04-27
申请号:US17508081
申请日:2021-10-22
摘要: A computer-implemented method includes: monitoring, by a computing device, outputs of sensors associated with a machine that receives magnetic stripe cards; in response to the monitoring, detecting, by the computing device, the output of at least one of the sensors indicates an event; in response to the detecting the event, determining, by the computing device, a number of the sensors whose output indicates a respective event during a predefined time period; selecting, by the computing device, a security action from a plurality of predefined security actions based on the determined number of the sensors whose output indicates a respective event during the predefined time period; and initiating, by the computing device, the security action.
-
公开(公告)号:US20230126452A1
公开(公告)日:2023-04-27
申请号:US17508023
申请日:2021-10-22
发明人: Cesar Augusto Rodriguez Bravo , Carolina Garcia Delgado , David Alonso Campos Batista , DESILDA TOSKA
摘要: A method for detecting a fake keypad includes: monitoring outputs of plural magnetic field sensors connected to a keypad; detecting the output of at least one of the magnetic field sensors indicates the presence of a magnetic field; starting, in response to the detecting, a timer; determining the first timer reaches a first threshold while the output of the at least one of the magnetic field sensors still indicates the presence of a magnetic field; in response to the timer reaching the first threshold, determining a number of the magnetic field sensors whose output indicates the presence of a magnetic field equals or exceeds a second threshold; in response to the number of the magnetic field sensors equaling or exceeding the second threshold, determining a security action; and initiating the security action.
-
公开(公告)号:US11585557B2
公开(公告)日:2023-02-21
申请号:US16918677
申请日:2020-07-01
摘要: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor. The method includes receiving a plurality of real-time airflow patterns acquired by a plurality of airflow alerters, wherein each real-time airflow pattern corresponds to a different airflow alerter; comparing each real-time airflow pattern with a predetermined airflow pattern, wherein each real-time airflow pattern corresponds to a different predetermined airflow pattern; when there is any real-time airflow pattern different from the corresponding predetermined airflow pattern, identifying a group of airflow alerters among the plurality of airflow alerters, wherein a real-time airflow pattern of each airflow alerter in the group is different from the corresponding predetermined airflow pattern; and identifying a location of an anomaly based on the group of airflow alerters.
-
公开(公告)号:US11512861B2
公开(公告)日:2022-11-29
申请号:US16918655
申请日:2020-07-01
摘要: A computer-implemented method for anomaly detection in a data processing system comprising a processor and a memory comprising instructions which are executed by the processor, the method including: receiving, by the processor, a real-time airflow pattern detected from an airflow alerter, wherein the real-time airflow pattern is generated by a heating, ventilation, and air conditioning (HVAC) system in a particular facility; comparing, by the processor, the real-time airflow pattern to a predetermined airflow pattern for the HVAC system; and when the real-time airflow pattern is different from the predetermined airflow pattern, receiving, by the processor, an alert message indicating an anomaly from the airflow alerter.
-
公开(公告)号:US11457019B2
公开(公告)日:2022-09-27
申请号:US16406123
申请日:2019-05-08
摘要: In an approach for an access control system, a processor verifies an identity of a user in specified time intervals based on a first device associated with the user. A processor sends a validation token to a cloud-based system and updates a record associated with the user in the cloud-based system. A processor, in response to an attempt to access a secure area, transmits the validation token to a second device. A processor verifies the validation token by the second device with the cloud-based system.
-
公开(公告)号:US20220019685A1
公开(公告)日:2022-01-20
申请号:US16930266
申请日:2020-07-15
摘要: Aspects of the present invention disclose a method, computer program product, and system for managing data based on updates to data management policies. The method includes one or more processors monitoring data sources for updates to data management policies that apply to an organization. In response to identifying an update to a data management policy that applies to the organization, the method further includes one or more processors generating a data management rule based on the update to the data management policy. The data management rule includes a defined action to take on data records that correspond to a defined characteristic. The method further includes one or more processors identifying a first set of data records that include the defined characteristic of the rule. The method further includes one or more processors performing the defined action of the rule on the first set of data records.
-
公开(公告)号:US20220019549A1
公开(公告)日:2022-01-20
申请号:US16930738
申请日:2020-07-16
摘要: A method for protecting a system from a malicious USB device. The method includes one or more computer processors interrupting a universal serial bus (USB) enumeration process corresponding to a first USB device operatively couple to a system. The method further includes determining whether the first USB device is a human interface device (HID) based on a set of descriptor values corresponding to the first USB device. The method further includes responding to determining that that first USB device is a HID by generating a validation challenge. The method further includes presenting the validation challenge to a user of the system. The method further includes responding to determining that the user fulfils one or more actions of the validation challenge by resuming the USB enumeration process corresponding to the first USB device.
-
10.
公开(公告)号:US20220006812A1
公开(公告)日:2022-01-06
申请号:US16918176
申请日:2020-07-01
摘要: According to one embodiment, a method, computer system, and computer program product for managing access to one or more protected web resources based on the location of an approver is provided. The present invention may include granting the requestor access to the protected web resource based on one or more access requirements being met, wherein at least one access requirement comprises a location of one or more authorization devices corresponding with one or more approvers being within a threshold distance of a computing device of a requestor requesting a protected web resource.
-
-
-
-
-
-
-
-
-