20240012917. SYSTEMS AND METHODS FOR FACILITATING RESPONSES TO DETECTED ACTIVITY simplified abstract (MASTERCONTROL, INC.)

From WikiPatents
Jump to navigation Jump to search

SYSTEMS AND METHODS FOR FACILITATING RESPONSES TO DETECTED ACTIVITY

Organization Name

MASTERCONTROL, INC.

Inventor(s)

Chad Milito of Ogden UT (US)

Terrance L. Holbrook of Bountiful UT (US)

SYSTEMS AND METHODS FOR FACILITATING RESPONSES TO DETECTED ACTIVITY - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240012917 titled 'SYSTEMS AND METHODS FOR FACILITATING RESPONSES TO DETECTED ACTIVITY

Simplified Explanation

The abstract of this patent application describes a system that obtains content access attributes and entity authorization attributes associated with content presented at a user interface at a particular physical location. The system uses sensors to detect entities and obtain sensor data associated with their position at the physical location. Based on the content access attributes and entity authorization attributes, the system determines an interface security action to be implemented at the user interface. It can also identify suspect entities based on the attributes and event attributes, or recommend modifications to entity authorization attributes based on detected attributes and entity activity attributes.

  • The system obtains content access attributes and entity authorization attributes for content presented at a user interface at a specific physical location.
  • Sensors are used to detect entities and obtain sensor data related to their position at the physical location.
  • The entity authorization attributes are determined based on the sensor data obtained by the sensors.
  • Based on the content access attributes and entity authorization attributes, the system determines an interface security action to be implemented at the user interface.
  • The system can identify suspect entities based on the entity authorization attributes and event attributes.
  • It can also recommend modifications to entity authorization attributes based on detected attributes and entity activity attributes.

Potential applications of this technology:

  • Enhancing security measures at user interfaces in physical locations.
  • Improving access control to content based on entity authorization attributes.
  • Identifying and monitoring suspect entities in real-time.
  • Providing recommendations for modifying entity authorization attributes based on entity activity.

Problems solved by this technology:

  • Ensuring that only authorized entities have access to content at user interfaces.
  • Detecting and addressing potential security threats or suspicious activities.
  • Enhancing the overall security and control of content presentation at physical locations.

Benefits of this technology:

  • Improved security and access control measures.
  • Real-time monitoring and detection of suspect entities.
  • Enhanced customization and adaptability of entity authorization attributes.
  • Efficient management of content access and security at user interfaces.


Original Abstract Submitted

a system obtains content access attributes associated with content presented at a user interface at a particular physical location. the content access attributes indicate intended accessibility of the content presented at the user interface at the particular physical location. the system obtains entity authorization attributes determined for an entity detected by sensors configured to obtain sensor data associated with entities positioned at the particular physical location. the entity authorization attributes are determined based upon the sensor data obtained by the sensors. based upon the content access attributes and the entity authorization attributes, the system determines an interface security action for implementation at the user interface at the particular physical location. a system may additionally or alternatively (i) determine suspect entities based on entity authorization attributes and event attributes or (ii) determine recommended modifications to entity authorization attributes based on detected entity authorization attributes and entity activity attributes.