Automatic vehicle climate control based on predicted air quality

    公开(公告)号:US10226982B2

    公开(公告)日:2019-03-12

    申请号:US14699223

    申请日:2015-04-29

    摘要: Mechanisms are provided for controlling air quality within an interior of a vehicle. Air quality data is received from a vehicle mounted sensor of the vehicle, and at least one of a sensor of another vehicle, an external environment sensor, or a remotely located information source system. A first air quality measure is determined for an external environment exterior to the vehicle and a second air quality measure of an internal environment of the vehicle is determined based on the air quality data. At least one control signal to send to a climate control system of the vehicle is determined based on the determined first air quality measure and determined second air quality measure. Air quality within the internal environment of the vehicle is controlled by sending the at least one control signal to the climate control system.

    MANAGING SECURITY BREACHES IN A NETWORKED COMPUTING ENVIRONMENT

    公开(公告)号:US20180083989A1

    公开(公告)日:2018-03-22

    申请号:US15827003

    申请日:2017-11-30

    IPC分类号: H04L29/06 G06F21/55

    摘要: Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.