METHODS, SYSTEMS, AND DEVICES FOR ADJUSTING AN AVATAR BASED ON SOCIAL MEDIA ACTIVITY

    公开(公告)号:US20240193881A1

    公开(公告)日:2024-06-13

    申请号:US18062709

    申请日:2022-12-07

    CPC classification number: G06T19/20 G06Q50/01

    Abstract: Aspects of the subject disclosure may include, for example, receiving first data associated with an avatar of a first user, and identifying first media content associated with the first user provided to a first social media server. The first social media server presents the first media content and the avatar on a first social media site. Further embodiments can include analyzing the first media content resulting in an analysis, generating second data associated with an adjusted avatar based on the analysis and the first data associated with the avatar, and providing the second data to the first social media server. The first social media server ceases presenting the avatar on the first social media site and presents the adjusted avatar on the first social media site according to the second data. Other embodiments are disclosed.

    Security management on a mobile device

    公开(公告)号:US12010515B2

    公开(公告)日:2024-06-11

    申请号:US18192295

    申请日:2023-03-29

    Inventor: Kaustubh Joshi

    CPC classification number: H04W12/08 H04W12/37 H04W88/02

    Abstract: Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.

    Application resource allocation for wireless services

    公开(公告)号:US12010168B2

    公开(公告)日:2024-06-11

    申请号:US17649253

    申请日:2022-01-28

    CPC classification number: H04L67/1021 H04L67/14 H04W4/029 H04W64/003 H04W88/16

    Abstract: Connecting user equipment (UE) to an application can be managed based on UE movement and location. During data session between UE and application, a communication management component (CMC) associated with anchor network component (ANC) or serving network component (SNC) determines UE location, and connects UE to the ANC and SNC, which enables access of the application via a data network associated with ANC. As UE moves, CMC tracks UE movement and communication conditions. If, when UE is at second location, a communication condition breaches threshold level, CMC determines whether interruption of the data session is permitted. If not, CMC determines whether there is a local SNC in proximity to second location. If there is, CMC can switch UE from SNC to local SNC, which can access local application content via local data network associated with application. If interruption permitted, UE deactivates and reactivates to connect to local ANC.

    Application-aware BGP path selection and forwarding

    公开(公告)号:US12010012B2

    公开(公告)日:2024-06-11

    申请号:US17520128

    申请日:2021-11-05

    Abstract: A routing structure is defined for provider edge (PE) routers that will create the ability to recompute best paths based on application criteria. The routing structure may include the use of a network controller which is connected with the internet to receive requests from applications to trigger path re-computation. The controller will peer with PEs to send re-computation information used by the PE to construct an application-aware BGP table and forwarding instance. The PE also defines a new BGP and packet filter to replicate specific BGP paths into the application-aware table. The application-aware BGP and forwarding instance is unique to the requesting application. Thus, each request with a different source/destination combination obtains a discrete table providing separation. When a packet enters the PE from customer edge (CE) or core interface the packet traverses a packet filter that when matched against source/destination is redirected to the appropriate application-aware forwarding table. Once in the application-aware table the packet is then forwarded along the application-aware path achieving the objective. The instantiation of the application-aware BGP and forwarding table is be done based on BGP updates learned from the controller.

Patent Agency Ranking