Systems and methods for detecting digital security breaches of connected assets based on location tracking and asset profiling

ABSTRACT

Systems and methods are provided for detecting unauthorized manipulations of assets. A digital security breach detection system requests and receives an insurance policy from an insurance system for an asset. The digital security breach detection system further analyzes transactions received by the asset from various devices to determine whether the transactions are unauthorized manipulations. In response to detecting an unauthorized manipulation, the digital security breach detection system generates notifications to pre-authorized devices associated with the asset. Additionally, the digital security breach detection system generates claims relating to the unauthorized manipulation under the insurance policy for the asset.

BACKGROUND

Insurance providers value the safety of its customers, their assets, and the general public. Due to increased connectivity, many everyday assets are now configured for remote accessibility and are therefore exposed to risk of digital security breaches by unauthorized users and devices. Unauthorized manipulations may lead not only to the damage of the asset subjected to the digital security breach, but also other related or nearby assets. In conventional arrangements, it may be difficult or impossible to timely detect digital security breaches of an asset and thereby minimize the damage.

BRIEF SUMMARY

The following presents a simplified summary of various aspects described herein. This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents some concepts in a simplified form as an introductory prelude to the more detailed description provided below.

Some aspects described herein provide a digital security breach detection system. The digital security breach detection system may include at least one processor. The digital security breach detection system may be configured to, in operation, receive a notification, from an asset, of a transaction from a requesting device requesting modification of the asset. Responsive to the notification, the digital security breach detection system may be configured to, in operation, determine whether the requesting device is a pre-authorized device, and whether a location of the requesting device is within a threshold radius of the location of the asset. Responsive to determining that the requesting device is not a pre-authorized device and/or is not within a threshold radius of the asset, the digital security breach detection system may be configured to, in operation, generate an asset profile for the asset based on sensor data. The digital security breach detection system may be configured to, in operation, use the asset profile to determine whether the modification requested by the transaction is consistent with the asset profile. Responsive to determining that it is not, the digital security breach detection system may notify the asset of an unauthorized manipulation and provide instructions to cancel the transaction. Further, the digital security breach detection system may be configured to, in operation, generate an insurance claim based on the unauthorized manipulation under an insurance policy for the asset.

Additional aspects described herein are directed to an asset that may include one or more sensors, and at least one processor. The asset may be configured to, in operation, receive a transaction requesting a modification of the asset from a requesting device. The asset may issue a temporary hold on the transaction. Further, the asset may collect sensor data from the one or more sensors, and notify a digital security breach detection system of the transaction and of the sensor data. In response, the asset may be configured to, in operation, receive a notification of an unauthorized manipulation and instructions to cancel the transaction from the digital security breach detection system. Further, responsive to the instructions, the asset may be configured to, in operation, remove the temporary hold on the transaction and cancel the transaction.

Still other aspects described herein provide a computer-assisted method of detecting digital security breaches. A special-purpose computing system may receive a notification, from an asset, of a transaction from a requesting device requesting modification of the asset. Responsive to the notification, the special-purpose computing system may determine whether the requesting device is a pre-authorized device, and whether a location of the requesting device is within a threshold radius of the location of the asset. Responsive to determining that the requesting device is not a pre-authorized device and is not within the threshold radius of the asset, the special-purpose computing device may generate an asset profile for the asset based on sensor data. The special-purpose computing system may then use the asset profile to determine whether the modification requested by the transaction is consistent with the asset profile. Responsive to determining that it is not, the special-purpose computing system may notify the asset of an unauthorized manipulation and provide instructions to cancel the transaction. Further, the special-purpose computing system may generate an insurance claim based on the unauthorized manipulation under an insurance policy for the asset.

The details of these and other aspects of the disclosure are set forth in the accompanying drawings and description below. Other features and advantages of aspects of the disclosure will be apparent from the description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Aspects of the disclosure may be implemented in certain parts, steps, and embodiments that will be described in detail in the following description and illustrated in the accompanying drawings in which like reference numerals indicate similar elements. It will be appreciated with the benefit of this disclosure that the steps illustrated in the accompanying figures may be performed in other than the recited order and that one or more of the steps may be optional. It will also be appreciated with the benefit of this disclosure that one or more components illustrated in the accompanying figures may be positioned in other than the disclosed arrangement and that one or more of the components illustrated may be optional.

FIG. 1 is a block diagram illustrating various components and devices associated with an example digital security breach detection system, according to one or more aspects of the disclosure.

FIG. 2 is a block diagram of an example of an implementation of a digital security breach detection system according to one or more aspects of the disclosure.

FIG. 3 is a flowchart of example method steps for detecting digital security breaches of a connected asset according to one or more aspects of the disclosure.

FIG. 4 is an example user interface of an asset protection system configured to provide alerts according to one or more aspects of the disclosure.

FIG. 5 is an example user interface of an asset protection system configured to provide alerts according to one or more aspects of the disclosure.

DETAILED DESCRIPTION

In the following description of the various embodiments, references are made to the accompanying figures, which form a part hereof, and in which are shown by way of illustration, various embodiments of the disclosure that may be practiced. Other embodiments may be utilized.

As a general introduction to the subject matter described in more detail below, aspects of the present disclosure are directed toward an asset protection system, including a digital security breach detection system and one or more assets. The assets may be connected home devices/appliances (e.g., refrigerators, ovens, stoves, water heaters, washing machines, dryers, dishwasher, furnaces, air conditioning units, smoke detectors, alarms, coffee makers, etc.), connected vehicles, autonomous vehicles, and the like. It will be appreciated that assets may be other devices or systems without departing from the invention.

The digital security breach detection system monitors transactions at an asset in order to detect unauthorized manipulations of the assets. The digital security breach detection system may be configured with various rules to classify a transaction as an unauthorized manipulation. For example, the digital security detection system may analyze whether the requesting device associated with the transaction has been pre-authorized by the asset. Alternatively, the digital security detection system may analyze the location of the requesting device to determine whether it is within a threshold radius of the asset's location. The digital security detection system may also analyze the transaction based on the asset's profile. As such, the digital security detection system may collect operational data from the asset in order to create an asset profile. An asset profile may be generated by analyzing historical trends in the operational data of an asset. An asset profile for a thermostat may, for example, provide an average temperature, a temperature range, seasonal variations, etc. In some cases, the asset profile may vary based on the outside weather conditions (e.g., outside temperature), day of the week (e.g., weekday vs. weekend, etc.), time of day (e.g., morning, evening, night, etc.), and so forth. For instance, an asset profile for thermostat may provide temperature setting or temperature range at which the thermostat is typically set during the workday. In another example, an asset profile for a coffee maker may provide the hours of the day at which the coffee making is typically on. In a further example, an asset profile for a garage door may provide the hours of the day during which door is typically open or closed. In an additional example, an asset profile or a vehicle may provide the average speed of the vehicle for certain hours of the day (e.g., during rush hour traffic, etc.) or certain weather conditions (e.g., in clear conditions, in rainy or snowy conditions, etc.).

Based on the asset profile, the digital security breach detection system may determine whether the intended result of the transaction would be consistent with the asset profile.

In cases where the digital security breach detection system determines, responsive to the hierarchical analysis described above, that there has been an unauthorized manipulation (or an attempted unauthorized manipulation) of the asset, the digital security breach detection system may take steps to minimize the damage caused by the unauthorized manipulation. For instance, the digital security breach detection system may cancel the transaction in cases where the transaction has not yet been executed by the asset, or it may rollback the transaction in cases where the transaction has already been executed. Further, the digital security breach detection system may notify any pre-authorized devices associated with the asset. In some embodiments, the digital security breach detection system may allow a user of a pre-authorized device to override the determination of the digital security breach detection system. As such, a user of a pre-authorized device may choose to allow a transaction to be executed, even where the digital security breach detection system classified the transaction as an unauthorized manipulation. In these cases, the digital security breach detection system may only issue a temporary cancellation or rollback (e.g., by placing a hold) on the transaction, while awaiting override instructions from a pre-authorized device. Where no override instructions are received within a threshold time period, the digital security breach detection system may issue a final cancellation or rollback on the transaction. By contrast, where override instructions are received within a threshold time period, the digital security breach detection system may notify the asset to allow the transaction.

In some examples, the digital security breach detection system may request and receive an insurance policy for the breached asset from an insurance system. The digital security breach detection system may generate claims under the insurance policy for the asset, subject to the terms of the insurance policy.

In some examples, the digital security breach detection system may be implemented by an entity, such an insurance provider.

It is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, the phrases and terms used herein are to be given their broadest interpretation and meaning. The use of “including” and “comprising” and variations thereof is meant to encompass the items listed thereafter and equivalents thereof, as well as additional items and equivalents thereof. As used in this description, a set refers to a collection of one or more elements. As used in this description, a driver, as used in the description, refers to any individual operating a vehicle. The individual may or may not hold a fully qualified driver's license. The individual may or may not hold an insurance policy.

FIG. 1 is an illustration of an example implementation of an asset protection system 100. The system 100, in this example, includes a digital security breach detection system 130. The digital security breach detection system 130, described in further detail below, detects manipulations of an asset by analyzing transactions received by the asset to determine whether the manipulations, or requested manipulations, are unauthorized. In one example, the asset 104 may be installed at, attached to, or in signal communication with a home 102. Further, the home 102 may be in signal communication with the digital security breach detection system. In another example, the asset may be a vehicle 114. The assets (asset 104 or vehicle 114) are network-enabled, and thus capable of communicating via wired or wireless networks, such that the digital security breach detection system 130 may be in signal communication with the assets. As such, the assets may include any device configured such that it may be considered as part of the Internet of Things.

Transactions at the asset (asset 104 or vehicle 114) may be received from a computing system 110 (e.g., laptop, desktop, web server, database server, on-board vehicle computer, short-range communication system, etc.) or from a mobile computing system 112 (e.g., mobile phone, smartphone, tablet, wearable device, etc.). The digital security breach detection system 130 may analyze the transactions in view of a combination of the following: (1) the identity of the requesting device (e.g., to determine whether the requesting device is pre-authorized or otherwise recognized by the asset); (2) the location of the requesting device (e.g., to determine whether the requesting device is/was within a threshold radius of the asset at the time of the transaction); and (3) data received from sensors associated with the asset, where the sensors may be installed at, attached to, or in signal communication with the asset or various systems or components of the asset (e.g., to determine whether the intended result of the transaction is consistent with the typical operation of the asset). The digital security breach detection system 130 may determine the identity of a requesting device based on a unique device identifier (e.g., a device ID, a serial number, a Unique Device Identification (UDI/UDID/UUID), etc.) or Internet Protocol (IP) address. In other examples, the digital security breach detection system 130 may construct a unique identifier for the requesting device based on a unique combination of one or more device attributes, such as a unique device identifier, device type, IP address, and so forth.

In examples where the asset is a vehicle, transactions may also be analyzed in view of telematics data. Vehicle telematics data, as used in this description, refers to data indicating how a driver operates a vehicle with respect to, e.g., accelerating, decelerating, braking, turning, signaling, lane usage, adequate vehicle spacing, speed, distraction management, and other driving-related operations performed by the driver at the vehicle. Vehicle telematics data may also include operational data of the vehicle (e.g., performance data, maintenance data, and the like). A vehicle telematics device may be installed at, attached to, or in signal communication with a vehicle or various systems or components of the vehicle.

In response to detecting an unauthorized manipulation, the digital security breach detection system 130 may be in signal communication with the breached asset (asset 104 or vehicle 114) in order to cancel or rollback the transaction. Further, the digital security breach detection system 130 may be in signal communication with one or more computing systems 132 or mobile computing systems 134 to provide notifications, where the one or more computing systems 132 or mobile computing systems 134 are pre-authorized devices associated with the breached asset (asset 104 or vehicle 114). The digital security breach detection system 130 may also be in signal communication with one or more insurance systems 140 to request and receive information regarding an insurance policy associated with an asset, and/or to generate claims under an insurance policy covering the breached asset.

The digital security breach detection system 130 is a special-purpose computing device that is configured to receive operational data from one or more assets 104, 114 and/or vehicle driving data from one or more vehicles 114. With reference to assets 104 associated with a home 102, the information may be received from sensors 106 installed in and/or attached to the asset 104. The sensors 106 may be capable of detecting and recording various conditions at the asset and operating parameters of the asset. For instance, the sensors 106 may include a motion sensor, a presence sensor, a light sense, a pressure sensor, a fluid sensor, a sound sensor, a temperature sensor, a chemical sensor, an electric sensor, a magnetic sensor, a vibration sensor, and so forth.

With reference to vehicles 114, the information may be received from (i) telematics devices 116 installed at and attached to the vehicle 114, (ii) from telematics devices 116 located in the vehicle 114 during its operation (e.g., a mobile special-purpose computing device), or (iii) from special-purpose computing devices located remotely relative to the vehicle 114 that received the vehicle telematics data “from the vehicle” as described in (i) or (ii). The digital security breach detection system 130 may also be configured to receive telematics data from one or more third-party telematics systems. Additionally, the digital security breach detection system 130 may receive additional data relevant to vehicle operation data from other non-vehicle data sources, such as external traffic databases containing traffic data (e.g., amounts of traffic, average driving speed, traffic speed distribution, and numbers and types of accidents, etc.) at various times and locations, external weather databases containing weather data (e.g., rain, snow, sleet and hail amounts, temperatures, wind, road conditions, visibility, etc.) at various times and locations, and other external data sources containing driving hazard data (e.g., road hazards, traffic accidents, downed trees, power outages, construction zones, school zones, and natural disasters, etc.).

In some examples, the digital security breach detection system 130 may acquire information about a vehicle directly from the vehicle 114, where the vehicle telematics data may be generated at the vehicle 114 itself. In such examples, the vehicle 114 may include one or more sensors 120, which are capable of detecting and recording various conditions at the vehicle and operating parameters of the vehicle. For example, the sensors 120 may detect, transmit, or store data corresponding to the vehicle's location (e.g., GPS coordinates), speed and direction, rates of acceleration, deceleration, or braking, and specific instances of sudden acceleration, braking, and swerving. The sensors 120 may also detect, transmit, or store data received from the vehicle's internal systems, such as impact to the body of the vehicle, air bag deployment, headlights usage, brake light operation, door opening and closing, door locking and unlocking, cruise control usage, hazard lights usage, windshield wiper usage, horn usage, turn signal usage, seat belt usage, phone and radio usage within the vehicle, maintenance performed on the vehicle, and other data collected by the vehicle's computer systems.

Additional sensors 120 may detect and store the external driving conditions, for example, external temperature, rain, snow, light levels, and sun position for driver visibility. Additional sensors 120 may also detect and store data relating to compliance with traffic laws and the observance of traffic signals and signs. Additional sensors 120 may further detect and store data relating to the maintenance of the vehicle 114, such as the engine status, oil level, engine coolant temperature, odometer reading, the level of fuel in the fuel tank, engine revolutions per minute (RPMs), tire pressure, or combinations thereof. Certain vehicle sensors 120 may also collect information regarding the driver's route choice, whether the driver follows or deviates from a given route. In some examples, a Global Positioning System (GPS), locational sensors placed inside the vehicle 114, and/or locational sensors or devices external to the vehicle 114 may be used to determine the route, lane position, and other vehicle position or location information.

The data collected by the asset sensors 106 or vehicle sensors 120 may be stored or analyzed within the respective asset 104 or vehicle 114, or may be transmitted to one or more external devices. For example, as shown in FIG. 1, the sensor data may be transmitted to a digital security breach detection unit 108 or 118, which may be a collection of special-purpose computing devices that are interconnected and in signal communication with each other. The digital security breach detection unit 108 or 118 may be a separate special-purpose computing device or may be integrated into one or more components of the asset 104 or the vehicle 114 (e.g., the telematics device 116, the internal computing systems of the vehicle 114, and the like). The digital security breach detection unit 108 or 118 may be configured to perform functions associated with using the vehicle telematics data to detect any unauthorized manipulations of the asset 104 or vehicle 114. For example, the digital security breach detection unit 108 or 118 may analyze the sensor data and/or vehicle telematics data to generate an asset profile and/or vehicle profile based on historical trends. Further, the digital security breach detection unit 108 or 118 may analyze a new transaction at the asset 104 or vehicle 114 to determine whether it is an unauthorized manipulation. In some examples, the digital security breach detection unit 108 or 118 may determine whether the requesting device is pre-authorized by the asset 104 or vehicle 114, whether the location of the requesting device is within a threshold radius of the asset 104 or vehicle 114, and/or whether the transaction is consistent with the asset profile or vehicle profile.

In the example shown in FIG. 1, with respect to vehicles 114, the telematics device may receive vehicle telematics data from the vehicle sensors 120, and may transmit the data to the digital security breach detection system 130. The telematics device 116 may contain or may be integral with one or more of the vehicle sensors 120, or may be separate from the one or more of the vehicle sensors 120.

However, in other examples, one or more of the sensors may be configured to transmit data directly to the digital security breach detection system 130 without using a telematics device 116. For instance, a telematics device 116 may be configured to receive and transmit data from certain vehicle sensors 120, while other sensors may be configured to directly transmit data to a digital security breach detection system 130 without using the telematics device 116. Thus, in some embodiments, the telematics device 116 may be optional.

In some embodiments, a mobile special-purpose computing device 122 may be programmed with instructions to collect vehicle telematics data from the telematics device 116 or from the sensors 120, and then to transmit the vehicle telematics data to the digital security breach detection system 130 and other external computing devices. Further, the mobile special-purpose computing device 122 may include an accelerometer, a GPS unit, and a telecommunication unit. Software applications executing on the mobile special-purpose computing device 122 may be configured to detect vehicle telematics data independently and/or may communicate with the vehicle sensors 120 to receive additional vehicle telematics data. For example, a mobile special-purpose computing device 122 equipped with an accelerometer and/or a GPS unit may independently determine vehicle location, speed, direction, and other basic vehicle telematics data, without needing to communicate with the vehicle sensors 120, or any other vehicle system. In other examples, software on the mobile special-purpose computing device 122 may be configured to receive some or all of the vehicle telematics data collected by the vehicle sensors 120. In yet other examples, software on the mobile special-purpose computing device 122 may be configured to receive some or all of the vehicle telematics data from a telematics device 116 and/or third-party telematics systems.

When the mobile special-purpose computing device 122 within the vehicle 114 is used to detect vehicle telematics data or to receive vehicle telematics data from the vehicle 114, the mobile special-purpose computing device 122 may store, analyze, or transmit the vehicle telematics data to one or more other devices. For example, the mobile special-purpose computing device 122 may transmit vehicle telematics data to one or more other devices or systems. For example, the mobile special-purpose computing device 122 may transmit vehicle telematics data directly to the digital security breach detection system 130, and thus, may be used in conjunction with or instead of the telematics device 116. Moreover, the processing components of the mobile special-purpose computing device 122 may be used to collect and analyze vehicle telematics data to identify unauthorized manipulations of the vehicle 114. Therefore, in certain embodiments, the mobile special-purpose computing device 122 may be used in conjunction with, or in place of, the digital security breach detection unit 118.

In some embodiments, the functionality of the digital security breach detection unit 108 or 118 may be performed in the digital security breach detection system 130, rather than by the asset 104 or vehicle 114. In such implementations, the asset 104 or vehicle 114 might only collect and transmit sensor data and/or vehicle telematics data to the digital security breach detection system 130, and thus, the digital security breach detection unit 108 or 118 may be optional.

In some examples, the digital security breach detection system 130 may be configured to initiate communication with or receive data from an asset 104 or a vehicle 114 wirelessly via sensors 106, sensors 120, and/or telematics devices 116. In other examples, the asset 104 or vehicle 114 may notify the digital security breach detection system 130 of a new transaction, responsive to which the digital security breach detection system 130 may request or receive data from the asset 104 or vehicle 114.

The digital security breach detection system 130 may also be configured to send and receive data to and from an insurance system 140. For example, the digital security breach detection system 130 may be in direct communication with one or more databases within the insurance system 140, or may be in indirect communication with one or more databases within the insurance system 140 via a remote service (e.g., a web service). The digital security breach detection system 130 may request and receive data from the insurance system 140 (or one or more databases within the insurance system 140) regarding insurance policies associated with an asset. Further, the digital security breach detection system 130 may send data to the insurance system 140 regarding an insurance claim under an insurance policy for an asset.

The various components of the asset protection system 100 may be in signal communication via various types of networks. The networks may include one or more of a wired network, a wireless network, or a combination of wired or wireless networks. Example networks that may be selectively employed include wired and wireless local area networks (LANs), wide area networks (WANs) such as the Internet, cellular communication networks, Bluetooth, Near Field Communication (NFC), and other types of wired and wireless networks configured for telecommunication. Network communications may utilize various network communication protocols. Examples of network communications protocols that may be selectively employed include TCP/IP, Ethernet, FTP, HTTP, GSM, CDMA, Wi-Fi (802.11), and WiMAX.

With reference to FIG. 2, an example implementation of a digital security breach detection system 130 is shown. In this example, the digital security breach detection system 130 includes various modules and databases that include hardware and/or software configured to analyze transactions at various assets to detect unauthorized manipulations of the assets, generate asset profiles based on operational data and telematics data associated with various assets, cancel or rollback transactions responsive to detecting an unauthorized manipulation of an asset, generate alerts responsive to detecting an unauthorized manipulation of an asset, and generate an insurance claim responsive to detecting an unauthorized manipulation of an asset. It will be appreciated that the digital security breach detection system 130 illustrated in FIG. 2 is shown by way of example and that other implementations of the digital security breach detection system 130 may include additional or alternative units and databases without departing from the scope of the claimed subject matter. In this example, the digital security breach detection system 130 includes a transaction analysis module 202, an asset profile generation module 204, a transaction rollback module 206, an alert generation module 208, an insurance claim generation module 210, and a data store 212.

The transaction analysis module 202, the asset profile generation module 204, the transaction rollback module 206, the alert generation module 208, and the insurance claim generation module 210 will be discussed in further detail below with reference to FIG. 3.

The data store 212 may store information relating to asset security and asset profiles. For example, the data store 212 may include an asset security information database 214, an asset profile information database 216, and an asset insurance information database 218.

The asset security information database 214 may store information associated with the security of assets. In at least some embodiments, the asset security information database 214 may maintain one or more lists of devices from which transactions are approved or rejected. The asset security information database 214 may store information associated with one or more assets in the lists, including a unique device identifier (e.g., a device ID, a serial number, a Unique Device Identification (UDI/UDID/UUID), etc.), a device type (e.g., a desktop computer, a server, a mobile device, etc.), an Internet Protocol (IP) address, and so forth. In examples where a unique device identifier is unavailable, the asset security information database 214 may store a unique device key generated by the digital security breach detection system 130, where the unique device key may be a combination of one or more attributes of the device. In yet other examples, the asset security information database 214 may store one or more device attributes of a pre-authorized device. As such, any requesting device having these one or more device attributes may be pre-authorized. The asset security information database 214 may be keyed by a unique identifier associated with an asset (e.g., an asset ID).

For example, the asset security information database 214 may maintain a first list of devices from which transactions are approved (e.g., pre-authorized devices). In some examples, transactions received from devices in the first list may be automatically approved and executed. Additionally or alternatively, the asset security information database 214 may maintain a second list of devices from which transactions were previously approved (e.g., recognized devices). In some examples, transactions received from devices in the second list may not automatically be approved and executed. As such, further analysis of the device's location and the asset's profile may be required to approve and execute transactions from devices in the second list. Additionally or alternatively, the asset security information database 214 may maintain a third list of devices from which transactions were previously cancelled or rolled back. Transactions from these devices may have been previously blocked or rolled back by the digital security breach detection system 130. In some examples, transactions received from devices in the third list may be automatically rejected. In other examples, transactions received from devices in the third list may be temporarily cancelled or rolled back until approval is received from a pre-authorized device.

In other examples, the asset security information database 214 may maintain a whitelist (i.e., pre-authorized devices) and a blacklist (i.e., rejected devices). As such, transactions received from devices in the whitelist may be automatically approved, and transactions received from devices in the blacklist may be automatically rejected (i.e., cancelled or rolled back).

The asset profile information database 216 may store information associated with the typical operation of assets. For example, the asset profile information database 216 may store operational data relating to an asset and telematics data relating to a vehicle. Further, the asset profile information database 216 may store historical trends based on the operational data and/or telematics data received from the one or more assets and/or telematics devices associated with an asset. The asset profile information database 216 may be keyed by a unique identifier associated with an asset (e.g., an asset ID). In some examples, the historical trends may be grouped by a sensor type (e.g., temperature, pressure, movement, location, etc.). In other examples, the historical trends may be grouped by one or more contextual attributes (e.g., day of the week, time of day, outside temperature, etc.).

The asset insurance information database 218 may store information associated with insurance policies covering particular assets (e.g., an insurance policy ID, an insurance provider, an insurance policy type, one or more terms of the insurance policy, etc.). The asset insurance information database 28 may be keyed by a unique identifier associated with an asset (e.g., an asset ID).

Referring now to FIG. 3, a flow-chart 300 of example steps for generating an insurance policy for an asset, receiving and analyzing transactions received at the asset based on operational data and vehicle telematics data, and detecting and responding to an unauthorized manipulation is shown. The various components of the digital security breach detection system 130 may be used to perform these steps.

A new asset 104 or 114 may be added to the asset protection system 100. As such, the digital security breach detection system 130 may be configured to protect the asset, and may be communicatively coupled to the asset 104 or 114, one or more sensors 106 or 120, and a telematics device 116. In some examples, the digital security breach detection system 130 may also be communicatively coupled with a digital security breach detection unit 108 or 118. Responsive to the asset being added to the asset protection system 100, information associated with the asset may be stored in the asset security information database 214. For instance, the digital security breach detection system 130 may store one or more devices as pre-authorized devices associated with the asset. Additionally or alternatively, the digital security breach detection system 130 may store one or more devices as blocked devices associated with the asset.

In some examples, the digital security breach detection system 130 may communicate with an insurance system 140 to generate an insurance policy to cover digital security breaches of the asset (step 302). In such examples, the digital security breach detection system 130 may send a request to create a new insurance policy to the insurance system 140. Alternatively, the digital security breach detection system 130 may send a request to update an existing insurance policy responsive to a new asset. Responsive to the request, the digital security breach detection system 130 may receive information associated with the new or existing insurance policy. In cases where the asset is already associated with an insurance policy for digital security breaches, the digital security breach detection system 130 may retrieve information associated with the existing insurance policy. Additionally, in some examples, the digital security breach detection system 130 may communicate with the insurance system 140 to send a request to update an existing insurance policy responsive to an asset being removed (e.g., asset is no longer eligible for insurance coverage, asset is upgraded, asset is replaced, asset is destroyed, etc.).

In the above examples, the digital security breach detection system 130 may store information associated with the insurance policy in the asset insurance information database 218.

In step 304, the digital security breach detection system 130 may be notified of a new transaction received at the asset 104 or 114 from a computing device 110 or a mobile computing device 112. In some examples, the asset 104 or 114 may notify the digital security breach detection system 130 of a new transaction received at the asset 104 or 114. In other examples, the digital security breach detection unit 108 or 118 may notify the digital security breach detection system 130 of a new transaction received at the asset 104 or 114. In an alternate example, the digital security breach detection system 130 may periodically poll the asset 104 or 114 to identify any new transactions. In such examples, the asset 104 or 114 may maintain a list of incoming transactions. These incoming transactions may be placed on a temporary hold until analyzed by the digital security breach detection system 130.

The transaction analysis module 202 of the digital security breach detection system 130 may analyze the new transaction to determine whether it is an unauthorized manipulation of the asset 104 or 114 (step 306). In some examples, the digital security breach detection system 130 may execute a hierarchical analysis to detect an unauthorized manipulation. For example, at the first level of the hierarchical analysis, the transaction analysis module 202 may determine whether the requesting device is a pre-authorized device (step 308). As such, the transaction analysis module 202 may query the asset security information database 214, by the asset ID of the asset 103 or 114, for a list of pre-authorized devices. The transaction analysis module 202 may then determine whether the requesting device 110 or 112 is in the list of pre-authorized devices. In some examples, the comparison may be based on a unique device identifier received from the requesting device 110 or 112. In other examples, the comparison may be based on a unique device key, where the unique device key is generated by the transaction analysis module 202 based on a combination of one or more attributes of the device. In yet other examples, the comparison may be based on one more attributes of a pre-authorized device, whereby any requesting device 110 or 112 having the one or more attributes is considered a pre-authorized device. In these examples, the one or more attributes of a pre-authorized device may enable the transaction analysis module 202 to pre-authorize more than one requesting device, in contrast to a unique identifier. As such, a pre-authorized device may be identified by either a unique identifier or by one or more device attributes, and thus, a pre-authorized device may correspond to exactly one device 110 or 112, or it may correspond to a plurality of devices 110 or 112 having the prescribed attributes.

In examples where the requesting device 110 or 112 is included in the list of pre-authorized devices for the asset 104 or 114, the transaction analysis module 202 may determine that there is no unauthorized manipulation of the asset (step 314). In these cases, any temporary holds on the transaction may be removed, and the transaction will be executed.

By contrast, in examples where the requesting device 110 or 112 is not included in the list of pre-authorized devices for the asset 104 or 114, the transaction analysis module 202 may, at the second level of the hierarchical analysis, determine whether the location of the requesting device 110 or 112 is within a threshold radius (e.g., within 1 mile, within 5 miles, etc.) of the location of the asset 104 or 114 (step 310). Location may be expressed as a coordinate (e.g., a latitude and longitude combination), an address, as a point of interest, an IP address, etc. In examples where the location of the asset is expressed in a different format from the location of the requesting device, the transaction analysis module 202 may standardize all locations to be expressed in the same format (e.g., as coordinates). For example, the transaction analysis module 202 may be in signal communication with an address standardization service, for example, via an application program interface (API). In another example, the transaction analysis module 202 may be in signal communication with an IP geolocation service, for example, via an API, whereby the transaction analysis module 202 may receive a coordinate associated with the IP address. It will be appreciated that in some examples the results of the IP geolocation service may be less precise than a specific coordinate, and as such, may only identify a zip code, city, region, or country associated with the IP address. In these examples, the location may be expressed as a set of coordinates that define the zip code, city, region, or country.

In some examples, the location of the requesting device 110 or 112 may be included in the transaction. Alternatively, the transaction analysis may request location information from the requesting device 110 or 112.

The location of the asset 104 or 114 may be retrieved from the asset directly, either at time of the transaction or at the time of the analysis by the transaction analysis module 202. For example, the location of the asset 104 may be derived from the operational data received from the one or more sensors 106 or 120 associated with the asset, from a telematics device 116, from a mobile special-purpose computing device 122 (e.g., a mobile application installed on the mobile special-purpose computing device 122, a GPS sensor installed on the mobile special-purpose computing device, etc.), or a combination thereof.

In examples where the location of the requesting device 110 or 112 is within a threshold radius of the location of the asset 104 or 114, the transaction analysis module 202 may determine that there is no unauthorized manipulation of the asset (step 314). In these cases, any temporary holds on the transaction may be removed, and the transaction will be executed. In some cases, even where the locations are within a threshold radius, the transaction analysis module 202 may determine that there is insufficient data to make a determination as to whether the transaction is an unauthorized manipulation. For instance, where the IP geolocation service is unable to resolve an IP address of the requesting device 110 or 112 to a specific coordinate, the transaction analysis module 202 may elect to perform the third level of the hierarchical analysis. Accordingly, it follows that the transaction analysis module 202 may be configured to perform one or more levels of the hierarchical analysis to reach an ultimate determination on whether a transaction is an unauthorized manipulation of the asset.

At the third level of the hierarchical analysis, in examples where the location of the requesting device 110 or 112 is not within a threshold radius of the location of the asset 104 or 114, or in examples where the transaction analysis module 202 elects to perform the third level, the transaction analysis module 202 may determine whether the transaction is consistent with an asset profile of the asset 104 or 114 (step 312). The transaction analysis module 202 may query the asset profile information database 216, by the asset ID of the asset 103 or 114, for the asset profile. The transaction analysis module 202 may then determine whether the intended result of the transaction is consistent with the asset profile.

An asset profile for an asset 104 or 114 may be generated by the asset profile generation module 204. For example, the asset profile generation module 204 may analyze historical trends in the operational data and/or vehicle telematics data of an asset. The asset profile generation module 204 may receive and analyze sensor data (e.g., from one or more sensors 106 or 120 installed at, attached to, and/or remotely located relative to the asset 104 or 114), vehicle telematics data from a vehicle 114 (e.g., from a telematics device 116 installed at or attached to the vehicle), from a mobile special-purpose computing device 122 (e.g., a mobile application installed on a mobile special-purpose computing device 122), or a combination thereof. In some examples, the sensor data and vehicle telematics data may first be collected as a central location (e.g., at the digital security breach detection unit 108 or 118) and subsequently provided to the asset profile generation module 204. Thus, the asset profile generation module 204 may receive sensor data and vehicle telematics data from the various sources in real-time, or may receive a compiled version of the data from the central location. Alternatively, the asset profile generation module 204 may periodically request sensor data and vehicle telematics data from the asset.

The asset profile generator module 204 may determine normal operating conditions for an asset 104 or 114 based on the sensor data and/or the vehicle telematics data. In some examples, the asset profile generator module 204 may determine normal operating conditions under various circumstances. For example, the asset profile generator module 204 may identify one set of normal operating conditions for an air conditioning unit during business hours or during weekdays, and another set of normal operating conditions after business hours or during weekends. In some examples, normal operating conditions may be expressed as a range of values (e.g., 60° F. to 65° F. during business hours, 70° F. to 75° F. on the weekends, etc.). Alternatively, normal operating conditions may be expressed as an average value (e.g., an average temperature of 65° F. on the weekdays, etc.). Further, the asset profile generator module 204 may analyze the historical sensor data and/or vehicle telematics data to determine a maximum value (e.g., a maximum temperature of 85° F., etc.) and a minimum value (e.g., a minimum temperature of 60° F., etc.) for one or more characteristics of the asset 104 or 114. Based on the normal operating conditions, the asset profile generator module 204 may determine an asset profile for the asset 104 or 114. Further, the asset profile generator module 204 may store the asset profile in the asset profile information database 216.

In examples where the intended result of the transaction is consistent with the asset profile, the transaction analysis module 202 may determine that there is no unauthorized manipulation of the asset (step 314). A transaction may be consistent with the asset profile when the intended result of the transaction is within the normal operating conditions for the asset under the circumstances. For example, a transaction received at a water heater to modify the temperature to 120° F. is consistent with an asset profile that defines the normal temperature range to be between 110° F. and 140° F.

In contrast, in examples where the intended result of the transaction is not consistent with the asset profile, the transaction analysis module 202 may determine that there is an unauthorized manipulation of the asset (step 316). For instance, where a vehicle's asset profile defines the normal speed range between 5 PM and 6 PM to be between 10 mph and 40 mph, a transaction received at a vehicle 114 to increase the speed to 120 mph is not consistent with the vehicle's asset profile.

Responsive to detecting an unauthorized manipulation of an asset 104 or 114, the alert generation module 208 may notify one or more pre-authorized devices 132 or 134 of the asset regarding the transaction (step 318). In some examples, the notification may indicate a level of severity of the alert (e.g., low risk, medium risk, high risk, etc.). The level of severity may be based, at least in part, on the type of device and/or the potential risk/damage caused by allowing the transaction. For instance, the digital security breach detection system 130 may assign a higher level of severity to notifications regarding a vehicle asset, and a lower level of security to notifications regarding a coffee maker asset. In another example, the digital security breach detections system 130 may assign a higher level of security to notifications regarding a transaction changing a vehicle's speed to 120 mph, and a lower level of security to notifications regarding a transaction changing a vehicle's speed to 50 mph.

In some examples, the alert generation module 208 may allow one or more of the pre-authorized devices 132 or 134 to override the determination of the digital security breach detection system 130. As such, a pre-authorized device 132 or 134 of an asset 104 or 114 may send a notification to the digital security breach detection system 130 to allow the transaction from the requesting device 110 or 112. Accordingly, in these examples, the digital security breach detection system 130 may notify the asset 104 or 114 to allow and execute the transaction.

FIGS. 4 and 5 show example user interfaces 410 and 510 which may be configured to provide alerts to a pre-authorized device 132 or 134. Thus, the pre-authorized device 132 or 134 may be configured to display textual and/or graphical alerts pertaining to transactions received at the asset. The example user interfaces 410 and 510 may also enable the pre-authorized device 132 or 134 to provide instructions (e.g., to allow the transaction, to reject the transaction, etc.) to the digital security breach detection system 130 in response to the alerts. In examples where the pre-authorized device 132 or 134 is a mobile device, the user interface may be displayed on a mobile application installed on the pre-authorized device 132 or 134. The user interface, as shown by components 412 and 512 of example user interfaces 410 and 510, may include a description of the attempted transaction, an asset ID and/or a description of the asset, a transaction status, and a transaction date. The user interfaces 410 and 510 may also include one or more input fields to allow the pre-authorized devices 132 and 134 to respond to the notification. In example user interfaces 410 and 510, the one or more input fields are buttons for approving the transaction 414 and 424 and buttons for rejecting the transaction 416 and 426. Further, as shown in FIG. 5, the user interface 510 may indicate a level of severity 518 associated with the notification.

In some examples, where the pre-authorized device 132 or 134 is a mobile device, the notification may additionally be provided as a push notification. In other examples, the user interface 400 may be displayed on a desktop browser, on a mobile browser, or via a Short Message Service (SMS).

Further, the digital security breach detection system 130 may associate the requesting device 110 or 112 to asset 104 or 114 in the asset security information database 214 (e.g., add the requesting device to the first list of pre-authorized devices, the second list of previously approved devices, or the whitelist, etc.). In contrast, where a pre-authorized device of an asset either sends a notification to the digital security breach detection system 130 to reject the transaction (i.e., affirming the detection of the unauthorized manipulation) or does not provide any notification within a threshold time, the digital security breach detection system 130 may confirm that the transaction is an unauthorized transaction. It will be appreciated that allowing a pre-authorized device to override the determination of the digital security breach detection system 130 is optional.

In examples involving an unauthorized manipulation, the transaction rollback module 206 may either cancel or rollback the transaction (step 320). As such, the transaction rollback module 206 may send either a cancellation instruction or a rollback instruction to the breached asset. A transaction cancellation may be appropriate where the transaction was placed on a temporary hold and has not yet been executed. A transaction cancellation will ensure that the transaction is not executed by the asset 104 or 114. Alternatively, a transaction rollback may be appropriate where some or all steps of the transaction have been executed by the asset. In this example, the rollback instruction may require the asset 104 or 114 to reverse the some or all executed steps of the transaction, in order to return the asset to its prior state. Responsive to completing the cancellation or rollback, the transaction rollback module 206 may associate the requesting device 110 or 112 to the asset 104 or 114 in the asset security information database 214 (e.g., add the requesting device to the third list of previously rejected devices, or the blacklist, etc.).

In examples where some or all steps of a transaction were executed by the asset 104 or 114, thereby causing irreversible damage to the asset, the insurance claim generation module 210 of the digital security breach detection system 130 may generate a claim under the insurance policy identified in step 302 (step 322). As such, the insurance claim generation module 210 may be in signal communication with an insurance system 140.

In some examples, the insurance system 140 may provide incentives, such as lower insurance rates, for assets in the asset protection system 100. Further, some or all of the data collected by the digital security breach detection system 130 may be communicated to the insurance system 140. For instance, the insurance system 140 may receive operational data and/or telematics data associated with an asset in the asset protection system 100. As such, the insurance system 140 may adjust insurance rates for assets in the asset protection system 100 based on the received data. For instance, where operational data and/or telematics data associated with an asset indicates safe behavior, the insurance system 140 may decrease insurance rates for the asset. By contrast, where operational data and/or telematics data associated with an asset indicates unsafe and/or risky behavior (e.g., a garage door is left open for extended hours, a water heater set at a high temperature, a vehicle driving above the speed limit, etc.), the insurance system 140 may increase insurance rates for the asset.

However, the asset protection system 100 ensures that insurance rates are not negatively impacted when the unsafe and/or risky behavior was caused by an unauthorized manipulation. In these examples, the insurance system 140 may not increase insurance rates for an asset where the digital security breach detection system 130 identifies an unauthorized manipulation of the asset, and notifies the insurance system 140 of such unauthorized manipulation. For instance, in examples where an unauthorized manipulation causes a vehicle to travel at 120 mph, the digital security breach detection system 130 may notify the insurance system 140 of the unauthorized manipulation, thus ensuring that insurance rates for the vehicle are not negatively impacted.

While the disclosure has been described with respect to specific examples including presently illustrative modes of carrying out the disclosure, a person having ordinary skill in the art, after review of the entirety disclosed herein, will appreciate that there are numerous variations and permutations of the above-described systems and techniques that fall within the spirit and scope of the disclosure. 

What is claimed is:
 1. A digital security breach detection system comprising: at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the system to: receive, from an asset, a notification of a transaction from a requesting device; determine a modification of one or more operating parameters of the asset requested in the notification, wherein the modification comprises a plurality of steps to modify the one or more operating parameters, wherein at least one step of the plurality of steps have been executed by the asset, and wherein the asset is covered by an insurance policy against digital security breaches; determine whether the requesting device is a pre-authorized device by comparing a list of pre-authorized devices, obtained by querying an asset security information database, against an identifier corresponding to the requesting device received from the requesting device; determine a first location of the requesting device and a second location of the asset, wherein: the first location is determined based on the transaction information or communication with the requesting device; and the second location is determined based on at least one of retrieving the first location from the asset directly, deriving the second location from operational data received from one or more sensors installed on the asset, deriving the second location from operational data received from a telematics device installed on the asset, or a Global Positioning System (GPS) sensor of a mobile computing device within the asset; responsive to determining that the requesting device is not a pre-authorized device, determine whether the first location of the requesting device is within a threshold radius of the second location of the asset; responsive to determining that the first location of the requesting device is not within the threshold radius of the second location of the asset, generate an asset profile for the asset based on historical trends identified in sensor data received from the one or more sensors installed on the asset, wherein the historical trends indicate a historical range of values of the sensor data over a period of time; determine, by comparing the modification of the one or more operating parameters of the asset requested in the notification with the historical range of values of the sensor data over the period of time, whether the modification requested by the transaction is inconsistent with the asset profile; responsive to determining that the modification of the one or more operating parameters of the asset requested in the notification is inconsistent with the asset profile: notify, the asset of an unauthorized manipulation; and send a rollback instruction for cancelling the at least one step of the plurality of steps to return at least one of the one or more operating parameters of a current state of the asset to a value corresponding to a prior state of the asset, the rollback instruction causing the asset to return the at least one of the one or more operating parameters of the current state of the asset to the value corresponding to the prior state of the asset; and send, from the digital security breach detection system and to an insurance system in signal communication with the digital security breach detection system, a request for an update to the insurance policy based on the unauthorized manipulation.
 2. The system of claim 1, wherein the computer-readable instructions, when executed by the at least one processor, further cause the system to: notify pre-authorized devices in the list of pre-authorized devices of the unauthorized manipulation; receive, within a threshold time period, a second notification from at least one of the pre-authorized devices providing override instructions to allow the transaction; and provide the override instructions to the asset to execute the transaction.
 3. The system of claim 1, wherein the computer-readable instructions, when executed by the at least one processor, further cause the system to send the instructions by causing the system to: send, to a mobile computing device associated with the list of pre-authorized devices, the instructions for rolling back the at least one of the one or more steps.
 4. The system of claim 1, wherein: the asset is a vehicle; and the instructions, when executed by the at least one processor, further cause the system to: generate the asset profile for the asset further based on vehicle telematics data received from the vehicle telematics device installed on the asset.
 5. The system of claim 1, wherein determining whether the modification requested by the transaction is inconsistent with the asset profile comprises: determining a first time period associated with the transaction, and selecting, from the historical range of values, values corresponding to the first time period, wherein comparing the modification requested by the transaction with the historical range of values of the sensor data over the period of time comprises comparing the modification requested by the transaction with the values corresponding to the first time period.
 6. The system of claim 1, wherein the computer-readable instructions, when executed by the at least one processor, cause the system to determine the first location of the requesting device by submitting an Internet Protocol (IP) address of the requesting device to an IP geolocation service.
 7. The system of claim 1, wherein the asset is a vehicle, and wherein the second location of the asset is provided by the GPS sensor of the mobile device within the vehicle.
 8. A computer-assisted method of detecting digital security breaches comprising: receiving, by a digital security breach detection system from an asset, a notification of a transaction from a requesting device; determining, by a digital security breach detection system, a modification of one or more operating parameters of the asset requested in the notification, wherein the modification comprises a plurality of steps to modify the one or more operating parameters, wherein at least one step of the plurality of steps have been executed by the asset, and wherein the asset is covered by an insurance policy against digital security breaches; determining, by a digital security breach detection system, whether the requesting device is a pre-authorized device by comparing a list of pre-authorized devices, obtained by querying an asset security information database, against an identifier corresponding to the requesting device received from the requesting device; determining, by the digital security breach detection system, a first location of the requesting device and a second location of the asset, wherein: the first location is determined based on the transaction information or communication with the requesting device; and the second location is determined based on at least one of retrieving the first location from the asset directly, deriving the second location from operational data received from one or more sensors installed on the asset, deriving the second location from operational data received from a telematics device installed on the asset, or a Global Positioning System (GPS) sensor of a mobile computing device within the asset; responsive to determining that the requesting device is not a pre-authorized device, determining, by the digital security breach detection system, whether the first location of the requesting device is within a threshold radius of the second location of the asset at a time associated with the transaction; responsive to determining that the first location of the requesting device is not within the threshold radius of the second location of the asset, generating, by the digital security breach detection system, an asset profile based on historical trends identified in sensor data received from the one or more sensors installed on the asset, wherein the historical trends indicate a historical range of values of the sensor data over a period of time; determining, by the digital security breach detection system, by comparing the modification of the one or more operating para meters of the asset requested in the notification with the historical range of values of the sensor data over the period of time, whether the modification requested by the transaction is inconsistent with the asset profile; responsive to determining that the modification requested by the transaction is inconsistent with the asset profile: notifying, by the digital security breach detection system, the asset of an unauthorized manipulation; sending; by a digital security breach detection system, a rollback instruction for cancelling the at least one step of the plurality of steps to return at least one of the one or more operating parameter's of a current state of the asset to a value corresponding to a prior state of the asset, the rollback instruction causing the asset to return the at least one of the one or more operating parameters of the current state of the asset to the value corresponding to the prior state of the asset; and sending, by the digital security breach detection system, to an insurance system in signal communication with the digital security breach detection system, a request for an update to the insurance policy based on the unauthorized manipulation.
 9. The computer-assisted method of claim 8 further comprising: notifying the pre-authorized devices of the unauthorized manipulation; receiving, within a threshold time period, a second notification from at least one of the pre-authorized devices providing instructions to allow the transaction; and providing instructions to the asset to execute the transaction.
 10. The computer-assisted method of claim 8, wherein sending the rollback instruction comprises: sending, to a computing device associated with an owner of the asset, the rollback instruction for rolling back the at least one step of the plurality of steps.
 11. The computer-assisted method of claim 8, wherein the asset is a vehicle, and wherein generating the asset profile for the asset is further based on vehicle telematics data received from the vehicle telematics device installed on the asset.
 12. The computer-assisted method of claim 8, wherein the asset is a home appliance.
 13. The computer-assisted method of claim 8, wherein determining the first location of the requesting device includes submitting an Internet Protocol (IP) address of the requesting device to an IP geolocation service.
 14. The computer-assisted method of claim 8, wherein the asset is a vehicle, and wherein the second location of the asset is provided by the GPS sensor of the mobile device within the vehicle.
 15. The computer-assisted method of claim 8, further comprising determining that the asset is a vehicle type of device, wherein notifying the asset of the unauthorized manipulation includes indicating a high level of severity based on the vehicle type of device.
 16. The computer-assisted method of claim 8, further comprising determining that the asset is an appliance type of device, wherein notifying the asset of the unauthorized manipulation includes indicating a low level of severity based on the appliance type of device.
 17. The computer-assisted method of claim 8, wherein the rollback instruction is a temporary rollback instruction causing the asset to temporarily return the at least one operating parameter of the one or more operating parameters to the value corresponding to the prior state until an override instruction is received or a threshold time period elapses.
 18. A digital security breach detection system comprising: at least one processor; and memory storing computer-readable instructions that, when executed by the at least one processor, cause the system to: receive, from an asset, a notification of a requested transaction from a requesting device; determine a modification of one or more operating parameters of the asset requested in the notification, wherein the requested transaction comprises a plurality of steps to modify the one or more operating parameters, and wherein at least one step of the plurality of steps have been executed by the asset; determine a first location of the requesting device and a second location of the asset, wherein: the first location is determined based on the transaction information or communication with the requesting device; and the second location is determined based on at least one of retrieving the first location from the asset directly, deriving the second location from operational data received from one or more sensors installed on the asset, deriving the second location from operational data received from a telematics device installed on the asset, or a Global Positioning System (GPS) sensor of a mobile computing device within the asset; determine an asset profile based on historical trends identified in sensor data received from the one or more sensors of the asset, wherein the historical trends indicate a historical range of values of the sensor data over a period of time; determine whether the first location of the requesting device is within a threshold radius of the second location of the asset; determining, by comparing the modification of the one or more operating parameters of the asset requested in the notification with the historical range of values of the sensor data over the period of time, whether the modification requested by the transaction is inconsistent with the asset profile; based on determining that the first location of the requesting device is not within a threshold radius of the second location of the asset, and based on determining, that the modification requested by the transaction is inconsistent with the asset profile: notify the asset of an unauthorized manipulation; and send a rollback instruction for cancelling the at least one step of the plurality of steps to return at least one operating parameter of the one or more operating parameters of a current state of the asset to a value corresponding to a prior state of the asset, the rollback instruction causing the asset to return the at least one operating parameter of the one or more operating parameters of the current state of the asset to the value corresponding to the prior state of the asset; and sending to an insurance system in signal communication with the digital security breach detection system, a request for an update to an insurance policy based on the unauthorized manipulation.
 19. The system of claim 18, wherein the computer-readable instructions, when executed by the at least one processor, further cause the system to: receive, from the asset, a second notification of a second requested transaction from a second requesting device; and send a rejection instruction to the asset to cause the asset to reject the second requested transaction.
 20. The system of claim 18, wherein the asset is a vehicle, and wherein the one or more sensors comprise the vehicle telematics device. 