System and method for performing asset and crowd tracking in an IoT system
First Claim
1. A system for protecting a data processing asset comprising:
- a plurality of Internet of Things (IoT) hubs distributed throughout a facility;
a plurality of wearable IoT security devices, each of the plurality of wearable IoT security devices is assigned to a different user, the plurality of wearable IoT security devices comprise one of;
security badges, security bracelets and security necklaces;
an IoT service to store an association between each of the plurality of wearable IoT security devices and each respective user;
at least one IoT hub of the plurality of IoT hubs comprising;
authorized user detection logic to detect a wearable IoT security device of a user in wireless proximity to the at least one IoT hub through a Bluetooth Low Energy (BTLE) link;
a dock for the data processing asset, the dock including connection detection logic to detect a local connection of the data processing asset through a wired data connection, the data processing asset is removable from the dock without causing an alert and/or notification when the wearable IoT security device is in the wireless proximity to the at least one IoT hub;
wherein the authorized user detection logic is to arm the connection detection logic upon detecting that the wearable IoT security device has moved out of the wireless proximity to the at least one IoT hub due to a loss of the BTLE link;
wherein the connection detection logic is to generate an alert and/or notification after being armed by the authorized user detection logic upon detecting no local connection of the data processing asset due to a loss of the wired data connection and the data processing asset is no longer within the designated protected area, the alert and/or notification being transmitted from the at least one IoT hub to the IoT service via a secure communication channel using elliptic curve encryption.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are described for performing asset and user tracking. For example, one embodiment of a system comprises: an Internet of Things (IoT) device or hub (“IoT device/hub”) comprising authorized user detection logic to detect a security IoT device of a user in wireless proximity to the IoT device/hub, the IoT device/hub to be affixed or integrated within a data processing asset; location detection logic to determine a current location of the IoT device/hub based on signals received from one or more wireless devices within its wireless range; wherein the authorized user detection logic is to arm the location detection logic upon detecting that the security IoT device has moved out of wireless proximity to the IoT device/hub; and wherein the location detection logic is to generate an alert and/or notification after being armed by the authorized user detection logic upon detecting that the IoT device/hub has moved outside of a designated protected location, the alert and/or notification being transmitted from the IoT device/hub to an IoT service.
-
Citations
13 Claims
-
1. A system for protecting a data processing asset comprising:
-
a plurality of Internet of Things (IoT) hubs distributed throughout a facility; a plurality of wearable IoT security devices, each of the plurality of wearable IoT security devices is assigned to a different user, the plurality of wearable IoT security devices comprise one of;
security badges, security bracelets and security necklaces;an IoT service to store an association between each of the plurality of wearable IoT security devices and each respective user; at least one IoT hub of the plurality of IoT hubs comprising; authorized user detection logic to detect a wearable IoT security device of a user in wireless proximity to the at least one IoT hub through a Bluetooth Low Energy (BTLE) link; a dock for the data processing asset, the dock including connection detection logic to detect a local connection of the data processing asset through a wired data connection, the data processing asset is removable from the dock without causing an alert and/or notification when the wearable IoT security device is in the wireless proximity to the at least one IoT hub; wherein the authorized user detection logic is to arm the connection detection logic upon detecting that the wearable IoT security device has moved out of the wireless proximity to the at least one IoT hub due to a loss of the BTLE link; wherein the connection detection logic is to generate an alert and/or notification after being armed by the authorized user detection logic upon detecting no local connection of the data processing asset due to a loss of the wired data connection and the data processing asset is no longer within the designated protected area, the alert and/or notification being transmitted from the at least one IoT hub to the IoT service via a secure communication channel using elliptic curve encryption. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for protecting a data processing asset comprising:
-
a plurality of Internet of Things (IoT) hubs distributed throughout a facility in communication with an IoT service; a plurality of wearable IoT security devices, each of the plurality of wearable IoT security devices is assigned to a different user, the plurality of wearable IoT security devices comprise one of;
security badges, security bracelets and security necklaces;the IoT service to store an association between each of the plurality of wearable IoT security devices and each respective user; an IoT device comprising; authorized user detection logic to detect a wearable IoT security device of a user in wireless proximity to the IoT device through a Bluetooth Low Energy (BTLE) link, the IoT device is affixed or integrated within the data processing asset, location detection logic to determine a current location of the IoT device based on signal strength values received from a first subset of the plurality of IoT hubs within wireless range of the IoT device affixed or integrated within the data processing asset; wherein the authorized user detection logic is to arm the location detection logic upon detecting that the wearable IoT security device has moved out of the wireless proximity to the IoT device due to a loss of the BTLE link; and wherein the location detection logic is to generate an alert and/or notification after being armed by the authorized user detection logic upon detecting that the IoT device has moved outside of a designated protected location based on receiving different signals from a second subset of the plurality of IoT hubs within wireless range of the IoT device affixed to or integrated within the data processing asset, the alert and/or notification being transmitted from the IoT device to the IoT service via a secure communication channel using elliptic curve encryption. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification