-
公开(公告)号:US11093482B2
公开(公告)日:2021-08-17
申请号:US16299747
申请日:2019-03-12
IPC分类号: G06F16/23 , G06F16/245 , G06F21/62
摘要: Systems and methods for managing access to data in a network are provided. In embodiments, a method includes: receiving, by a computer device, a search request regarding data of a participant, the search request including participant parameters associated with the participant; generating, by the computer device, a record of data associated with the participant based on the search request; sending, by the computer device, a request for data to third party nodes of a blockchain system based on the search request and the record; receiving, by the computer device, results from the blockchain system, the results including at least one set of data from a first node of the third party nodes; and determining, by the computer device, that the set of data requires updating based on the results.
-
公开(公告)号:US11047705B2
公开(公告)日:2021-06-29
申请号:US16510362
申请日:2019-07-12
摘要: A method, computer system, and a computer program product for providing a personalized anxiety-reducing navigation system for a user utilizing augmented reality (AR) and virtual reality (VR) is provided. The present invention may include detecting a current location of the user. The present invention may then include, in response to detecting the current location of the user is beyond a comfort boundary threshold, determining a stress state of the user. The present invention may also activate an AR system. The present invention may further, in response to determining the determined stress state of the user is high, activate a VR system.
-
公开(公告)号:US11010480B2
公开(公告)日:2021-05-18
申请号:US16170301
申请日:2018-10-25
摘要: The method, computer system, and computer program product for using a key management server to protect visible content. The method, computer program product, and computer system may include a key management server which may receive, from an encryption device, an identification of one or more portions of clear information visible on a physical document. The key management server may receive, from the encryption device, one or more permission parameters. The permission parameters may include a time duration parameter, a location parameter, a start and end time parameter, or a device identification parameter. Further, the key management server may receive, from a decryption device, a request to access a portion of the clear information. The key management server may transmit, to the decryption device, information permitting access to the portion of clear information.
-
公开(公告)号:US20200335011A1
公开(公告)日:2020-10-22
申请号:US16385183
申请日:2019-04-16
摘要: A quantum state visualization device comprising at least a portion of a spherical shell and a support structure affixed to the spherical shell. A portion of the support structure can intersect a center of the spherical shell. The quantum state visualization device further comprising a indicator pivotally attached to the support structure at the portion of the support structure intersecting the center of the spherical shell. The indicator is representative of a quantum state based on its position relative to the spherical shell.
-
95.
公开(公告)号:US20190258563A1
公开(公告)日:2019-08-22
申请号:US16398332
申请日:2019-04-30
IPC分类号: G06F11/36
摘要: A method for finding the cause of an error or unexpected behavior of a software application includes providing a list of steps to be executed in order to achieve a certain behavior of the application in a usage scenario and providing a decision tree corresponding with the usage scenario. The decision tree comprises decision nodes that correspond with the steps in the sequence of steps to be executed and leaf nodes indicating one or more possible solutions. The method includes scanning log files to determine whether a step in the list of steps to be executed has not been executed and traversing the decision tree when a step in the list of steps has not been executed. A leaf node of the decision tree that corresponds to a non-executed step is determined and a solution is extracted from the determined leaf node.
-
公开(公告)号:US20180099644A1
公开(公告)日:2018-04-12
申请号:US15839475
申请日:2017-12-12
摘要: An identification of a vehicle is received. An identification of a first user to receive delegation of control of the vehicle is received. Authentication information for the first user for the vehicle is determined. A request to authenticate the first user for delegation of control of the vehicle to the first user is received. The request to authenticate includes at least the authentication information for the first user is determined. Responsive to the determination, control of the vehicle is delegated to the first user.
-
公开(公告)号:US09942221B2
公开(公告)日:2018-04-10
申请号:US15212376
申请日:2016-07-18
发明人: Vinod A. Valecha
IPC分类号: H04L29/06
CPC分类号: H04L63/083 , G06F21/36 , H04L63/10 , H04L63/102
摘要: An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol. The approach then allows the user to independently rotate each of the concentric layers until a desired symbol is positioned in a predetermined user specified validation section, i.e., an alignment of segments across the totality of the concentric layers. The approach then generates a password based on concatenating the symbols associated with the segments aligned in the validation section in an order predetermined by the user. The approach then submits the generated password for validation against a user predetermined password locally on a client computer or remotely on a server computer.
-
公开(公告)号:US09928512B2
公开(公告)日:2018-03-27
申请号:US14952282
申请日:2015-11-25
CPC分类号: G06Q30/016 , H04L51/24 , H04L67/306 , H04W4/00
摘要: A system for intelligently determining changes to a service provider user's parameters in the service provider system. The system generally includes a service provider's computer system which contains a computer and a user database stored thereon; a user carried service provider tool, such as an ATM card, a cell phone, and the like; and a remote device whose use by the user is monitored by the service provider, such as an ATM machine (e.g., if the service provider is a bank and the service provider tool is an ATM card) or a phone or cell tower (e.g., if the service provider is a telecommunications service provider and the tool is a cell phone). Activity amongst the computer system, user carried service provider tool, and remote device is wirelessly monitored by the service provider (or an agent of the service provider) in an electronic communications network.
-
公开(公告)号:US20180019992A1
公开(公告)日:2018-01-18
申请号:US15212376
申请日:2016-07-18
发明人: Vinod A. Valecha
IPC分类号: H04L29/06
CPC分类号: H04L63/083 , G06F21/36 , H04L63/10 , H04L63/102
摘要: An approach to authenticating a user for resource access. The approach displays independently bi-directionally rotating concentric layers wherein each of the concentric layers are divided into segments and each segment contains a symbol. The approach then allows the user to independently rotate each of the concentric layers until a desired symbol is positioned in a predetermined user specified validation section, i.e., an alignment of segments across the totality of the concentric layers. The approach then generates a password based on concatenating the symbols associated with the segments aligned in the validation section in an order predetermined by the user. The approach then submits the generated password for validation against a user predetermined password locally on a client computer or remotely on a server computer.
-
公开(公告)号:US20170324637A1
公开(公告)日:2017-11-09
申请号:US15427497
申请日:2017-02-08
发明人: Ossama Emam , Vinod A. Valecha
IPC分类号: H04L12/26 , H04L29/08 , H04L12/869
CPC分类号: H04L43/103 , G06F9/541 , G06F9/542 , H04L47/58 , H04L67/32
摘要: An approach, executed by a computer, for adjusting polling parameters. The approach includes one or more processors polling an endpoint application using an initial polling quantity and an initial polling frequency. The approach includes determining a first number of events not consumed in a queue of a listening application and a second number of events in a queue at the endpoint application at an end of a polling cycle. Furthermore, the approach includes adjusting at least one of the initial polling quantity and the initial polling frequency based, at least in part, on a comparison of the first number of events not consumed in the queue of the listening application and the second number of events in the queue at the endpoint application at the end of the polling cycle.
-
-
-
-
-
-
-
-
-