TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES
    1.
    发明申请
    TECHNOLOGIES FOR DETERMINING A THREAT ASSESSMENT BASED ON FEAR RESPONSES 有权
    基于恐惧反应来确定威胁评估的技术

    公开(公告)号:US20160189517A1

    公开(公告)日:2016-06-30

    申请号:US14583695

    申请日:2014-12-27

    IPC分类号: G08B21/04

    摘要: Technologies for determining a threat assessment based on fear responses comprises monitoring sensor data received from a sensor array located at a monitored site. The sensor data may include behavioral sensor data indicative of a physical behavior of individuals within the monitored site and physiological sensor data indicative of physiological characteristics of individuals within the monitored site. The threat assessment may be based on the behavioral sensor data and physiological sensor data. In some embodiments, context data related to the monitored site may be utilized analyze the behavioral sensor data and physiological sensor data and determine a threat assessment based thereon.

    摘要翻译: 基于恐惧响应来确定威胁评估的技术包括监测从位于被监视站点的传感器阵列接收到的传感器数据。 传感器数据可以包括指示被监测位点内的个体的物理行为的行为传感器数据和指示被监测位点内的个体的生理特性的生理传感器数据。 威胁评估可以基于行为传感器数据和生理传感器数据。 在一些实施例中,可以利用与所监视的站点相关的上下文数据来分析行为传感器数据和生理传感器数据,并基于此来确定威胁评估。

    Technologies for managing security threats to a computing system utilizing user interactions
    2.
    发明授权
    Technologies for managing security threats to a computing system utilizing user interactions 有权
    用于利用用户交互来管理计算系统的安全威胁的技术

    公开(公告)号:US09378364B1

    公开(公告)日:2016-06-28

    申请号:US14583692

    申请日:2014-12-27

    摘要: Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.

    摘要翻译: 用于管理计算系统上的安全威胁的技术包括检测对计算系统的安全威胁,确定在计算系统上采用的多个缓解场景以减轻安全威胁,以及实施多个缓解场景。 每个减缓情景包括计算系统要采取的一个或多个威胁缓解动作,用于执行威胁减轻动作的计算系统的一个或多个响应系统以及要采取威胁减轻动作的时间序列。 评估每个减缓情景的结果,并根据结果确定验证的减缓情景。 可以随后训练或习惯计算设备的用户以响应于设计为复制安全威胁的威胁场景,在验证的缓解场景的实施期间请求来自用户的交互来减轻安全威胁。

    TECHNOLOGIES FOR MANUFACTURING AN ENGINEERED BIO-SYSTEM
    3.
    发明申请
    TECHNOLOGIES FOR MANUFACTURING AN ENGINEERED BIO-SYSTEM 审中-公开
    制造工程生物系统的技术

    公开(公告)号:US20160281094A1

    公开(公告)日:2016-09-29

    申请号:US14672100

    申请日:2015-03-28

    IPC分类号: C12N15/63 G01N33/50 C12N15/10

    CPC分类号: G01N33/5038 G16B5/00

    摘要: Technologies for manufacturing an engineered biological system include determining a plurality of functions to be performed by the engineered biological system while in a corresponding state. The engineered biological system is to transition between states based on the presence of a corresponding transition trigger defined by a biological key associated with each state. A state machine mapping is generated for the manufacture of the engineered biological system. The engineered biological system is verified and subsequently activated in a host. An engineered biological system and associated method for performing a biological function are also disclosed.

    摘要翻译: 用于制造工程生物系统的技术包括在处于相应状态的同时确定要由工程生物系统执行的多个功能。 工程生物系统是基于由与每个状态相关联的生物密钥定义的对应的过渡触发的存在而在状态之间转换。 生成用于制造工程生物系统的状态机映射。 工程生物系统被验证并随后在宿主中激活。 还公开了一种用于进行生物功能的工程生物系统和相关方法。

    Technologies for managing sensor anomalies
    5.
    发明申请

    公开(公告)号:US20170184416A1

    公开(公告)日:2017-06-29

    申请号:US14998231

    申请日:2015-12-26

    IPC分类号: G01D3/08

    摘要: Technologies for managing sensor anomalies in a compute system include determining whether sensor data received from a first sensor is anomalous based on sensor data from another sensor and a correlation rule. The correlation rule defines an excepted correlation between the first sensor data and the second sensor data. If the correlation between the first sensor data and the second sensor data is not observed, the first sensor data may be deemed anomalous. If so, the first sensor data may be verified using another sensor or other correlation. If the first sensor is determined to be malfunctioning, the compute system may mitigate the loss of the first sensor by using another sensor in its place.

    Technologies for managing sensor malfunctions

    公开(公告)号:US20170185078A1

    公开(公告)日:2017-06-29

    申请号:US14998268

    申请日:2015-12-26

    IPC分类号: G05B23/02 H04W4/00

    摘要: Technologies for managing sensor malfunctions in a compute system include detecting a malfunctioning sensor of the compute system and determining a sensor function performed by the malfunctioning sensor. In response to detection of the malfunctioning sensor, a different sensor of the compute system is selected to perform the sensor function of the malfunctioning sensor. The selected sensor may be of a different sensor type relative to the sensor type of the malfunctioning sensor. The compute system subsequently performs the sensor function of the malfunctioning sensor using the selected sensor. To do so, the compute system may increase, modify, or adjust the manner in which the sensor data from the selected sensor is processed.