US 12,333,049 B2
Systems and methods for controlling data access in the presence of unauthorized persons
Alexander Tormasov, Bremen (DE); Serg Bell, Costa del Sol (SG); and Stanislav Protasov, Singapore (SG)
Assigned to Acronis International GmbH, Schaffhausen (CH)
Filed by Acronis International GmbH, Schaffhausen (CH)
Filed on Oct. 18, 2022, as Appl. No. 17/968,297.
Claims priority of provisional application 63/292,236, filed on Dec. 21, 2021.
Prior Publication US 2023/0195935 A1, Jun. 22, 2023
Int. Cl. G06F 21/62 (2013.01); G06F 21/31 (2013.01); G06V 20/52 (2022.01); G08B 21/02 (2006.01)
CPC G06F 21/6254 (2013.01) [G06F 21/31 (2013.01); G06V 20/52 (2022.01); G06V 20/53 (2022.01); G08B 21/02 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method for controlling data access, the method comprising:
receiving a request to access data on a computing device;
determining that the data requested for access has a first degree of confidentiality, wherein the first degree of confidentiality indicates that the data can only be accessed in an environment occupied by a threshold number of persons;
retrieving sensor data from a plurality of sensors located in the environment;
determining, based on the sensor data, a number of persons occupying the environment;
determining whether the number of persons exceeds the threshold number of persons;
in response to determining that the number of persons exceeds the threshold number of persons, denying the request to access the data;
receiving another request to access different data on the computing device;
determining that the different data requested for access has a second degree of confidentiality, wherein the second degree of confidentiality indicates that the different data can be partially accessed in the environment with more than the threshold number of persons; and
in response to determining that the number of persons exceeds the threshold number of persons, granting the another request to access the different data with limited access rights.