Search

EP-4472135-B1 - SYSTEMS AND METHODS FOR GENERATING AND MANAGING SECURITY LEVEL-AWARE MAP

EP4472135B1EP 4472135 B1EP4472135 B1EP 4472135B1EP-4472135-B1

Inventors

  • ZANGRI, Daniel
  • MORGAN, NICHOLAS
  • HERMAN, Hunter
  • MEACHAM, Matthew

Dates

Publication Date
20260513
Application Date
20240524

Claims (11)

  1. A method (600) for generating and managing a security level-aware map, the method being performed by one or more processors of a computing device and comprising: receiving (602) a map request from a first user to generate a map with a map security level; determining (604) if the map security level satisfies a first security condition comprising determining if the map security level is lower than or equal to a user security level of the first user; in response to determining that the map security level satisfies the first security condition, generating (608) the map with the map security level; receiving (610) a query from the first user, the query including one or more query parameters; identifying (612) a data feed associated with the query; receiving (614) the data feed from a data source, the data feed including a plurality of data items and each data item corresponding to a corresponding data security level; for each data item of the plurality of data items, determining (616) whether the data item satisfies a second security condition by determining whether the corresponding data security level of the data item is lower than or equal to the map security level; and adding (618) one or more data items of the plurality of data items that satisfy the second security condition on the map.
  2. The method of claim 1, wherein the one or more query parameters include at least one selected from a group consisting of a query entity, a query entity parameter, a geospatial parameter, a sensor type, a sensor, and a time parameter.
  3. The method of claim 1 or claim 2, wherein the identifying a data feed associated with the query comprises identifying the data feed based on the one or more query parameters using a machine learning model, wherein the data feed includes data related to the one or more query parameters from one or more sensors.
  4. The method of claim 1 or claim 2, wherein the identifying a data feed associated with the query comprises: receiving a selection of one or more data feeds, and selecting the data feed from the one or more data feeds based on the one or more query parameters.
  5. The method of any preceding claim, wherein the map request includes a request to access a preexisting map with the map security level.
  6. The method of any preceding claim, wherein the first security condition includes a criterion indicating whether the first user has permission to generate the map, and the second security condition includes a criterion indicating whether a data item is permitted to be presented on the map.
  7. The method of any preceding claim, further comprising: receiving a share request from the first user to share the map with a second user; determining whether a security level of the second user is higher than or equal to the map security level of the map; and in response to determining that the security level of the second user is higher than or equal to the map security level of the map, sharing the map with the second user.
  8. The method of claim 7, further comprising: in response to determining that the security level of the second user is lower than the map security level of the map, generating a notification indicating why the share request is denied; and presenting the notification to the first user.
  9. The method of any preceding claim, further comprising: continually receiving subsequent data feed from the data source in near real-time as the subsequent data feed is generated by the data source; determining whether one or more data items of the subsequent data feed satisfy the second security condition; and updating the map to provide one or more data items of the subsequent data feed that satisfy the second condition.
  10. A computing device (200) for generating and managing a security level-aware map, the computing device comprising: a processor (204); and a memory (212) having a plurality of instructions stored thereon that, when executed by the processor, causes the computing device to perform the method of any preceding claim.
  11. A non-transitory computer-readable medium storing instructions for generating and managing a security level-aware map, the instructions when executed by one or more processors of a computing device, cause the computing device to perform the method of any of claims 1 to 9.

Description

TECHNICAL FIELD Certain embodiments of the present disclosure are directed to systems and method relating to data security, including systems and methods providing access control in relation to maps. For example, certain embodiments are directed to systems and methods for generating and/or managing maps. More particularly, some embodiments of the present disclosure provide systems and methods for generating and/or managing security level-aware maps. BACKGROUND Large streams of data are captured to generate a map that provides a representation of an area. A data stream may include one or more data items that are more sensitive than others, for example in the sense that certain users may not be permitted to access one or more data items. However, it is challenging to control which data item(s) is or are shown on a map. Hence it is highly desirable to improve the techniques for generating a map associated with a security level to control what data items are presented on the map. US 2018/349007 A1 discloses systems and methods for geo-fenced dynamic dissemination. US 2015/031399 A1 discloses a method of digital publication monitoring by geo-location. US 2008/301570 A1 discloses a collaborative information sharing system that displays a spaciotemporal rendering with icons that represent items of interest. SUMMARY The invention is set forth in the claims. Certain embodiments of the present disclosure are directed to access control in relation to maps, for example systems and methods for generating and/or managing maps. More particularly, some embodiments of the present disclosure provide systems and methods for generating and/or managing security level-aware maps. According to some embodiments, a method for generating and managing a security level-aware map includes receiving a map request from a first user to generate a map with a map security level, determining if the map security level satisfies a first security condition, in response to determining that the map security level satisfies the first security level threshold, generating the map with the map security level, receiving a query from the first user, the query including one or more query parameters, identifying a data feed associated with the query, receiving the data feed from a data source, the data feed including a plurality of data items and each data item corresponding to a corresponding data security level, for each data item of the plurality of data items, determining whether the data item satisfies a second security condition, and adding one or more data items of the plurality of data items that satisfy the second security condition on the map. The method is performed using one or more processors. According to certain embodiments, a computing device for generating and managing a security level-aware map comprises a processor and a memory having a plurality of instructions stored thereon that, when executed by the processor, causes the computing device to receive a map request from a first user to generate a map with a map security level, determine if the map security level satisfies a first security condition, in response to determination that the map security level satisfies the first security level threshold, generate the map with the map security level, receive a query from the first user, the query including one or more query parameters, identify a data feed associated with the query, receive the data feed from a data source, the data feed including a plurality of data items and each data item corresponding to a corresponding data security level, for each data item of the plurality of data items, determine whether the data item satisfies a second security condition, and add one or more data items of the plurality of data items that satisfy the second security condition on the map. According to certain embodiments, a non-transitory computer-readable medium storing instructions for generating and managing a security level-aware map, the instructions when executed by one or more processors of a computing device, cause the computing device to receive a map request from a first user to generate a map with a map security level, determine if the map security level satisfies a first security condition, in response to determination that the map security level satisfies the first security level threshold, generate the map with the map security level, receive a query from the first user, the query including one or more query parameters, identify a data feed associated with the query, receive the data feed from a data source, the data feed including a plurality of data items and each data item corresponding to a corresponding data security level, for each data item of the plurality of data items, determine whether the data item satisfies a second security condition, and add one or more data items of the plurality of data items that satisfy the second security condition on the map. Depending upon embodiment, one or more benefits may be achieved. These be