Secure Data Sharing With Publicily Accessible Computing Nodes
    2.
    发明申请
    Secure Data Sharing With Publicily Accessible Computing Nodes 审中-公开
    安全数据共享与公共无障碍计算节点

    公开(公告)号:US20160080325A1

    公开(公告)日:2016-03-17

    申请号:US14952515

    申请日:2015-11-25

    Abstract: An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node via the first wireless path based on the first security status; and withholding the second information from the first local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. Other embodiments are described herein.

    Abstract translation: 本发明的实施例包括确定第一信息的第一安全状态和第二信息的第二安全状态,第二安全状态比第一安全状态更安全; 经由第一无线路径建立所述系统与第一本地计算节点之间的第一通信路径; 基于所述第一安全状态,经由所述第一无线路径将所述第一信息传送到所述第一本地计算节点; 以及基于所述第二安全状态从所述第一本地计算节点保留所述第二信息; 其中所述第一和第二信息被存储在所述系统和远程位置的计算节点中的至少一个上。 本文描述了其它实施例。

    Technologies for managing sensor malfunctions

    公开(公告)号:US10732582B2

    公开(公告)日:2020-08-04

    申请号:US14998268

    申请日:2015-12-26

    Abstract: Technologies for managing sensor malfunctions in a compute system include detecting a malfunctioning sensor of the compute system and determining a sensor function performed by the malfunctioning sensor. In response to detection of the malfunctioning sensor, a different sensor of the compute system is selected to perform the sensor function of the malfunctioning sensor. The selected sensor may be of a different sensor type relative to the sensor type of the malfunctioning sensor. The compute system subsequently performs the sensor function of the malfunctioning sensor using the selected sensor. To do so, the compute system may increase, modify, or adjust the manner in which the sensor data from the selected sensor is processed.

    Technologies for bio-chemically controlling operation of a machine

    公开(公告)号:US09983565B2

    公开(公告)日:2018-05-29

    申请号:US14671698

    申请日:2015-03-27

    CPC classification number: G05B19/406 G05B2219/24162

    Abstract: Technologies for bio-chemically controlling operation of a machine include applying a bio-chemical agent to an operator of the machine and controlling an operational characteristic of the machine based on the presence of the bio-chemical agent on the operator. The operational characteristic of the machine may be controlled based on the presence or lack of the biochemical agent on the operator. In some embodiments, the bio-chemical agent may be configured to generate a bio-chemical trigger in response to exposure to a biochemical or biological characteristic of the operator. The operation of the machine may be controlled based on such bio-chemical trigger or reaction.

    Technologies for determining a threat assessment based on fear responses
    6.
    发明授权
    Technologies for determining a threat assessment based on fear responses 有权
    基于恐惧反应确定威胁评估的技术

    公开(公告)号:US09547971B2

    公开(公告)日:2017-01-17

    申请号:US14583695

    申请日:2014-12-27

    Abstract: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.

    Abstract translation: 基于恐惧响应来确定威胁评估的技术包括监测从位于被监视站点的传感器阵列接收到的传感器数据。 传感器数据可以包括指示被监测位点内的个体的物理行为的行为传感器数据和指示被监测位点内的个体的生理特性的生理传感器数据。 威胁评估可以基于行为传感器数据和生理传感器数据。 在一些实施例中,可以利用与所监视的站点相关的上下文数据来分析行为传感器数据和生理传感器数据,并基于此来确定威胁评估。

    Secure data sharing with publicly accessible computing nodes

    公开(公告)号:US10154011B2

    公开(公告)日:2018-12-11

    申请号:US14952515

    申请日:2015-11-25

    Abstract: An embodiment of the invention includes determining a first security status for first information and a second security status for second information, the second security status being more secure than the first security status; establishing a first communication path between the system and a first local computing node via a first wireless path; conveying the first information to the first local computing node via the first wireless path based on the first security status; and withholding the second information from the first local computing node based on the second security status; wherein the first and second information are stored on at least one of the system and a remotely located computing node. Other embodiments are described herein.

    TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING USER INTERACTIONS
    8.
    发明申请
    TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING USER INTERACTIONS 有权
    将安全威胁管理到利用用户交互的计算机系统的技术

    公开(公告)号:US20160306968A1

    公开(公告)日:2016-10-20

    申请号:US15189717

    申请日:2016-06-22

    Abstract: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.

    Abstract translation: 用于管理计算系统上的安全威胁的技术包括检测对计算系统的安全威胁,确定在计算系统上采用的多个缓解场景以减轻安全威胁,以及实施多个缓解场景。 每个减缓情景包括计算系统要采取的一个或多个威胁缓解动作,用于执行威胁减轻动作的计算系统的一个或多个响应系统以及要采取威胁减轻动作的时间序列。 评估每个减缓情景的结果,并根据结果确定验证的减缓情景。 可以随后训练或习惯计算设备的用户以响应于设计为复制安全威胁的威胁场景,在验证的缓解场景的实施期间请求来自用户的交互来减轻安全威胁。

Patent Agency Ranking