-
公开(公告)号:US20190124492A1
公开(公告)日:2019-04-25
申请号:US16025093
申请日:2018-07-02
Applicant: International Business Machines Corporation
Inventor: Fabio Cerri , Alice Guidotti , Leonardo Rosati , Elia Tufarolo
CPC classification number: H04W4/50 , G06F9/44505 , H04L41/28 , H04L63/0823 , H04W12/06 , H04W64/00
Abstract: A method and system for controlling operation of a computing device. One or more applicable settings among settings of one or more features of the computing device are determined. The settings are indicated by policies provided by two or more providers according to priorities of corresponding providers for application of corresponding policies of the providers. The policies include an indication of corresponding settings of the one or more features of the computing device. The providers are validated with at least one authority. The at least one authority certified the priorities of the providers and permissions of the providers to set the features of the policies. The computing device is configured to operate according to the applicable settings of the features.
-
公开(公告)号:US20180173861A1
公开(公告)日:2018-06-21
申请号:US15382282
申请日:2016-12-16
Applicant: International Business Machines Corporation
Inventor: Alice Guidotti , Bernardo Pastorelli , Leonardo Rosati , Elia Tufarolo
Abstract: In one implementation, the present invention is directed to a method for controlling access to a software application using one or more processors configured by code, the method comprising repeating a usage verification cycle continually during a usage session of the software application, wherein each repetition of the usage verification cycle includes receiving a digital image of an access area used to access the software application, identifying a representation of one or more persons in the digital image, estimating an age of each one of the persons within the digital image, and comparing the estimated age of each one of the persons within the digital image to a predetermined age value provided in a usage policy dataset associated with at least of one of the persons within the digital image. The method further comprises interrupting the usage of the software application in response to the age of at least one of the persons within the digital image exceeding the predetermined age value provided in a usage policy dataset.
-