PROVIDING INTRUSION DETECTION, MONITORING AND PROTECTION IN A SYSTEM
First Claim
Patent Images
1. A system comprising:
- a processor including at least one core to execute an application to provide intrusion detection and protection;
a radar sensor to detect presence of at least one person within a detection zone about the system and to output a detection notification responsive to the presence detection, the at least one person separate from a user of the system; and
a peripheral controller coupled to the radar sensor to receive the detection notification and to provide the detection notification to the application, wherein the application is to cause a protection measure to be performed responsive to the detection notification.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a system includes a processor with at least one core to execute an application to provide intrusion detection and protection, a radar sensor to detect presence of one or more persons within a detection zone about the system and to output a detection notification responsive to the presence detection, and a peripheral controller coupled to the radar sensor to receive the detection notification and to provide the detection notification to the application, where the application is to cause a protection measure to be performed responsive to the detection notification. Other embodiments are described and claimed.
-
Citations
25 Claims
-
1. A system comprising:
-
a processor including at least one core to execute an application to provide intrusion detection and protection; a radar sensor to detect presence of at least one person within a detection zone about the system and to output a detection notification responsive to the presence detection, the at least one person separate from a user of the system; and a peripheral controller coupled to the radar sensor to receive the detection notification and to provide the detection notification to the application, wherein the application is to cause a protection measure to be performed responsive to the detection notification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving, in a processor of a system executing an intrusion monitoring application, an indication of a person moving into a first detection zone of the system; determining, in the processor, whether the person is located within a predetermined distance of the system; accessing a policy table to determine a selected protection technique to apply, responsive to determining that the person is located within the predetermined distance; and applying the selected protection technique to the system. - View Dependent Claims (14, 15, 16, 17, 20)
-
-
18. (canceled)
-
19. (canceled)
-
21. (canceled)
-
22. (canceled)
-
23. At least one computer readable storage medium comprising instructions that when executed enable a system to:
-
associate an intrusion detection application with a first application; enable a user to configure a set of parameters for the intrusion detection application; store the set of parameters in a policy table of the system; access the policy table to determine a protection technique to apply, responsive to receipt of an indication that a person is detected within a detection zone of the system during execution of the first application; and apply the protection technique, during execution of the first application. - View Dependent Claims (25)
-
-
24. (canceled)
Specification