GLOBAL CONTROL ACCESS PLATFORM
    11.
    发明申请

    公开(公告)号:US20250007920A1

    公开(公告)日:2025-01-02

    申请号:US18217179

    申请日:2023-06-30

    Abstract: A method for providing controlled access to resources in an enterprise begins by defining a “mesh” that associates a workplace team to a set of one or more workplace resources. The team has a role that, with respect to the resources, has a set of access permissions. An individual that is not then associated with the workplace team, e.g., in the given role, is assigned a physical or virtual token that represents the individual in the workplace environment. In response to detecting that the token is in physical or logical proximity to a member of the workplace team, the permissions are then automatically extended to the token. The resources are then accessible using the token. When the individual possessing the token is no longer in proximity, the access permissions are automatically revoked. The scope of the mesh configuration may be dynamically updated based on tracking activities of the workplace team.

    MANAGEMENT AND DEVELOPMENT OF MODIFICATIONS WITHIN A SOURCE CODE

    公开(公告)号:US20230342284A1

    公开(公告)日:2023-10-26

    申请号:US17660646

    申请日:2022-04-26

    CPC classification number: G06F11/3664 G06F11/3612 G06F11/3457

    Abstract: In an approach to improve implementing program code modifications within a predetermined system embodiments simulate an impact of an implemented modification to a software code against one or more predetermined constraints using a target environment. Further, embodiments comparing a first executed simulation against a second executed simulation of the software code, wherein the second executed simulation comprises the implemented modifications and a current version of the software code. Additionally, embodiments, generate guidance for a user based on the comparison of the first and second executed simulations, wherein the generated guidance comprises positive and negative impacts of the implemented software code modifications regarding compliance with the one or more predetermined constraints, and output, by a user interface, the generated guidance to the user detailing the impact of the implemented modification.

    AUTOMATIC GENERATION OF SOCIAL MEDIA MESSAGES REGARDING A PRESENTATION

    公开(公告)号:US20170149724A1

    公开(公告)日:2017-05-25

    申请号:US14951833

    申请日:2015-11-25

    CPC classification number: H04L51/32 H04L51/043 H04L51/046

    Abstract: Content being presented to an audience can be automatically monitored in real time. The content can include a plurality of content portions. Responsive to identifying presentation of the content advancing from a first portion of the content to a second portion of the content, whether at least one element of the second portion of the content is assigned a tag can be automatically determined. Responsive to determining that the at least one element of the second portion of the content is assigned the tag, a first social media message including the at least one element of the second portion of the content that assigned the tag can be automatically generated in real time. The first social media message can be automatically communicated, in real time, to at least one social media system for sharing with people.

    Transaction based temporary and secure access

    公开(公告)号:US09532166B2

    公开(公告)日:2016-12-27

    申请号:US14453239

    申请日:2014-08-06

    Abstract: A system includes a location tracking services server (LTSS) in communication with a location owner device. A tracking packet is sent from the location owner device to the LTSS. The tracking packet includes a unique transaction identifier that uniquely identifies the tracking packet as being associated with a transaction between the location owner and a location consumer. The LTSS sends to the location owner device a link that points to the tracking packet. The location owner device uses the link to send to the LTSS information (e.g., a GPS ID) that uniquely identifies a device associated with a location provider selected to fulfill the transaction. This information is used to update the tracking packet. The LTSS provides access for a temporary period defined by the tracking packet to location data that enables the location consumer device to display the geographical location of the device associated with the selected location provider.

    PROVIDING DATA SECURITY WITH A TOKEN DEVICE

    公开(公告)号:US20160219034A1

    公开(公告)日:2016-07-28

    申请号:US14669027

    申请日:2015-03-26

    Abstract: A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device. A request to retrieve a root directory of private data may be received, the request specifying a root directory name. In response to receiving the request to retrieve a root directory of private data, the root directory may be requested by establishing a wireless connection between the token device and a server computing device, transferring the root directory name to the server computing device, wherein the root directory name is used as a password to retrieve the root directory, and receiving the root directory from the server computing device by the token device.

Patent Agency Ranking