-
公开(公告)号:US20180217748A1
公开(公告)日:2018-08-02
申请号:US15718073
申请日:2017-09-28
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
IPC: G06F3/0488 , G06F3/0484 , G06F3/041
CPC classification number: G06F3/04883
Abstract: Embodiments of the present invention disclose a method, computer system, and a computer program product for adapting a user interface (UI) with a touchscreen. The present invention may include receiving, from the touchscreen, an input from a finger. The present invention may also include determining an orientation of the finger based on the received input. The present invention may then include adapting the UI based on the determined orientation. The present invention may further include displaying the adapted UI on the touchscreen.
-
42.
公开(公告)号:US09871774B1
公开(公告)日:2018-01-16
申请号:US15280917
申请日:2016-09-29
Applicant: International Business Machines Corporation
Inventor: Su Liu , John D. Wilson , Yin Xia
CPC classification number: H04L63/0435 , G06F3/005 , G06F3/013 , G06F21/316 , G06F21/32 , G06F21/45 , G06F2221/2141 , H04L9/0861 , H04L2463/081
Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to initiate a password selection session on a source augmented reality or virtual reality device (hereafter the source AR/VR device). The logic is also configured to cause the processing circuit to generate a symmetric password key according to a set of password determination rules. Also, the logic is configured to cause the processing circuit to encrypt data using the symmetric password key prior to sending the encrypted data to a receiver AR/VR device. Moreover, the logic is configured to cause the processing circuit to send the encrypted data from the source AR/VR device to the receiver AR/VR device. The symmetric password key is not exchanged with any other device.
-
43.
公开(公告)号:US09824206B1
公开(公告)日:2017-11-21
申请号:US15280931
申请日:2016-09-29
Applicant: International Business Machines Corporation
Inventor: Su Liu , John D. Wilson , Yin Xia
CPC classification number: G06F21/45 , G02B27/0093 , G02B27/017 , G02B27/0172 , G02B2027/0138 , G02B2027/014 , G02B2027/0178 , G02B2027/0187 , G06F1/163 , G06F3/011 , G06F3/013 , G06F21/316 , G06F21/32 , G06F2221/2141
Abstract: In one embodiment, a method includes initiating a password selection session on a source augmented reality or virtual reality device (hereafter the source AR/VR device). The method also includes tracking an eye gaze of a source user using the source AR/VR device. In addition, the method includes determining gazed content from the eye gaze of the source user using a password key phrase determination feature. Additionally, the method includes generating a symmetric password key utilizing the gazed content according to a set of password determination rules. Moreover, the method includes performing an operation using the source AR/VR device, the operation being secured by the symmetric password key. The symmetric password key is not exchanged with any other device.
-
公开(公告)号:US20230409421A1
公开(公告)日:2023-12-21
申请号:US17844357
申请日:2022-06-20
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Yi Dai , Ling Zhuo , Ying Cao , Yin Xia , Junfei Shen
IPC: G06F11/07
CPC classification number: G06F11/0751 , G06F11/0709
Abstract: First event data is obtained from a first computer system and second event data is obtained from a second computer system. A first shape of the first event data is identified, and a second shape of the second event data is identified. A shape similarity between the first shape and the second shape is calculated. The shape similarity is determined to be above a similarity threshold. Training features are generated from the first event data and the second event data based on the determining. The training features are input into an anomaly-detection model.
-
公开(公告)号:US20220191024A1
公开(公告)日:2022-06-16
申请号:US17122011
申请日:2020-12-15
Applicant: International Business Machines Corporation
Inventor: Su Liu , Yin Xia , Cheng Xu , Xinya Wang
Abstract: By analyzing a content of a first message, a confidentiality level of the first message is determined. An encryption rule for a first computational complexity level corresponding to the confidentiality level of the first message is selected. The first message is encoded according to the encryption rule. The encoded first message and the confidentiality level of the first message are caused to be sent to a recipient.
-
公开(公告)号:US11240570B1
公开(公告)日:2022-02-01
申请号:US17065547
申请日:2020-10-08
Applicant: International Business Machines Corporation
Inventor: Lu Fu , Yin Xia , Po Ya Chuang , Wei-Te Chiang
IPC: H04N21/845 , H04N7/01 , H04N21/6587 , G06K9/00
Abstract: In an approach, a processor determines respective resolution levels for a plurality of objects, presented in a video segment to be rendered, based on a relationship between a primary object and at least one remaining object of the plurality of objects. A processors, determines, from the video segment, a plurality of object-based video elements at the determined respective resolution levels, each of the plurality of object-based video elements corresponding to one of the plurality of objects. A processor causes the plurality of object-based video elements to be delivered for rendering the video segment.
-
公开(公告)号:US11075890B2
公开(公告)日:2021-07-27
申请号:US15919106
申请日:2018-03-12
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Ying Cao , Xin Cui , Yang Liang , Kun Shang , Yin Xia
Abstract: A method, system and computer program product for wireless communication between vehicles are provided. In the method, identification information of a first vehicle by a second vehicle being spatially close to the first vehicle is obtained. And a first key associated with the first vehicle by using the identification information is acquired. Data originated from the first vehicle and signed with a second key corresponding to the first key are identified with the first key. And then the identified data is processed.
-
公开(公告)号:US20200218440A1
公开(公告)日:2020-07-09
申请号:US16239223
申请日:2019-01-03
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Yin Xia , Lu Fu , Bin Xu , Jie Hu , Xiao Lin Sun , Zhang Yu Lin , Lei Pan
IPC: G06F3/0488 , G06F9/54 , G06F3/0484
Abstract: A computer-implemented method and a computer system are proposed. According to the method, one or more candidate target applications are obtained in response to determination of one or more pieces of source contents from one or more source applications. A target application is determined from the one or more candidate target applications, wherein the one or more candidate target applications are shown one by one in a pre-defined order. The one or more pieces of source contents are pasted into one or more target areas in response to determining the one or more target areas in the target application.
-
公开(公告)号:US10594748B2
公开(公告)日:2020-03-17
申请号:US15805561
申请日:2017-11-07
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abstract: A computer-implemented method of establishing a conversation between intelligent assistants includes subdividing content of a user's conversation monitored over a predetermined period of time into a plurality of segments, and associating a time stamp with each segment; hashing each of the plurality of segments wherein a hash value is associated with each segment; matching pairs of the hash values and their time stamps with hash values and time stamps received from one or more intelligent assistants associated with the one or more other persons; and establishing a connection between the user's intelligent assistant and an intelligent assistant of at least one of the one or more other persons, when the user's hash value and time stamp for one or more segments of the conversation match hash values and time stamps of one or more conversation segments of the at least one of the one or more other persons.
-
公开(公告)号:US10318812B2
公开(公告)日:2019-06-11
申请号:US15187862
申请日:2016-06-21
Applicant: International Business Machines Corporation
Inventor: Kulvir S. Bhogal , Rick A. Hamilton, II , Yin Xia , Yu Lin Zhai
Abstract: Embodiments of the present invention provide systems and methods for image correlation and distribution. The method includes receiving an image depicting at least one person, metadata for the image, contact data, facial recognition data, and location data. The method further includes analyzing the image and other data, and determining the identity of people in the image based on the facial recognition data and the location data.
-
-
-
-
-
-
-
-
-