International Business Machines Corporation (20240250984). System For Protecting Against Prying IoT Devices simplified abstract

From WikiPatents
Jump to navigation Jump to search

System For Protecting Against Prying IoT Devices

Organization Name

International Business Machines Corporation

Inventor(s)

Marco Simioni of Dublin (IE)

Stefano Braghin of Dublin (IE)

Mark Purcell of Naas (IE)

Killian Levacher of Dublin (IE)

System For Protecting Against Prying IoT Devices - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240250984 titled 'System For Protecting Against Prying IoT Devices

The abstract describes a method for protecting against prying devices on a computer network, specifically those capable of recording audio and/or video data and eavesdropping on audio/video conference calls. When an audio/video conference call is initiated, the prying devices are prevented from communicating over the network, and when the call ends, they are allowed to resume communication.

  • Identifying prying devices connected to the computer network
  • Preventing prying devices from communicating during audio/video conference calls
  • Allowing prying devices to resume communication after the conference call ends
  • Protection against unauthorized recording and eavesdropping on conference calls
  • Enhancing privacy and security on the computer network

Potential Applications: - Secure communication during sensitive audio/video conference calls - Preventing unauthorized surveillance and data recording on the network

Problems Solved: - Mitigating the risk of privacy breaches during conference calls - Protecting sensitive information from prying devices on the network

Benefits: - Enhanced security and privacy for audio/video communications - Safeguarding confidential information from unauthorized access

Commercial Applications: Title: Secure Communication Technology for Audio/Video Conferencing Potential commercial uses include secure communication platforms for businesses, government agencies, and organizations that require confidential audio/video conferencing capabilities. This technology can be marketed as a solution for protecting sensitive information during virtual meetings and discussions.

Questions about the technology: 1. How does this method differentiate between prying devices and legitimate network users? 2. What measures are in place to ensure the effectiveness of preventing prying devices during conference calls?


Original Abstract Submitted

protection against prying devices on a computer network is provided. the method comprises identifying a number of prying devices connected to the computer network, wherein the prying devices have the capability to record audio and/or video data, and wherein the prying devices have the potential to eavesdrop on an audio/video conference call. responsive to detecting initiation of the audio/video conference call, the prying devices are prevented from communicating over the computer network. responsive to detecting termination of the audio/video conference call, the prying devices are allowed to resume communication over the computer network.