ADAPTIVE SIMULATION OF CELEBRITY AND LEGACY AVATARS

    公开(公告)号:US20240212223A1

    公开(公告)日:2024-06-27

    申请号:US18088513

    申请日:2022-12-23

    CPC classification number: G06T11/00 G06T13/00

    Abstract: A device, computer-readable medium, and method for adaptive simulation of celebrity and legacy avatars in extended reality environments is disclosed. In one example, a method performed by a processing system including at least one processor includes acquiring preferences from a user with respect to a virtual interaction, matching the preferences to an individual for whom an avatar is available, rendering an extended reality environment in which the virtual interaction will occur, rendering the avatar in the extended reality environment, receiving an input from the user, extracting a meaning from the input, and controlling the avatar to present an output that is responsive to the meaning, wherein the output is generated dynamically using at least one of: an image of the individual, an audio of the individual, or biographical data of the individual.

    METHODS, SYSTEMS, AND DEVICES FOR ADJUSTING AN AVATAR BASED ON SOCIAL MEDIA ACTIVITY

    公开(公告)号:US20240193881A1

    公开(公告)日:2024-06-13

    申请号:US18062709

    申请日:2022-12-07

    CPC classification number: G06T19/20 G06Q50/01

    Abstract: Aspects of the subject disclosure may include, for example, receiving first data associated with an avatar of a first user, and identifying first media content associated with the first user provided to a first social media server. The first social media server presents the first media content and the avatar on a first social media site. Further embodiments can include analyzing the first media content resulting in an analysis, generating second data associated with an adjusted avatar based on the analysis and the first data associated with the avatar, and providing the second data to the first social media server. The first social media server ceases presenting the avatar on the first social media site and presents the adjusted avatar on the first social media site according to the second data. Other embodiments are disclosed.

    Security management on a mobile device

    公开(公告)号:US12010515B2

    公开(公告)日:2024-06-11

    申请号:US18192295

    申请日:2023-03-29

    Inventor: Kaustubh Joshi

    CPC classification number: H04W12/08 H04W12/37 H04W88/02

    Abstract: Example mobile devices disclosed herein include a camera, memory including computer-executable instructions, and a processor to execute the instructions to at least associate a location of the mobile device with picture data obtained with the camera. The processor is also to assign a first data tag to the picture data when the location of the mobile device corresponds to a first area, the first data tag to identify a first security level for the picture data, or assign a second data tag to the picture data when the location of the mobile device does not correspond to the first area, the second data tag to identify a second security level for the picture data. The processor is further to determine whether to permit an application to access the picture data based on whether the first data tag or the second data tag is assigned to the picture data.

    Application resource allocation for wireless services

    公开(公告)号:US12010168B2

    公开(公告)日:2024-06-11

    申请号:US17649253

    申请日:2022-01-28

    CPC classification number: H04L67/1021 H04L67/14 H04W4/029 H04W64/003 H04W88/16

    Abstract: Connecting user equipment (UE) to an application can be managed based on UE movement and location. During data session between UE and application, a communication management component (CMC) associated with anchor network component (ANC) or serving network component (SNC) determines UE location, and connects UE to the ANC and SNC, which enables access of the application via a data network associated with ANC. As UE moves, CMC tracks UE movement and communication conditions. If, when UE is at second location, a communication condition breaches threshold level, CMC determines whether interruption of the data session is permitted. If not, CMC determines whether there is a local SNC in proximity to second location. If there is, CMC can switch UE from SNC to local SNC, which can access local application content via local data network associated with application. If interruption permitted, UE deactivates and reactivates to connect to local ANC.

Patent Agency Ranking