Quantum computing-based video alert system

    公开(公告)号:US11699334B2

    公开(公告)日:2023-07-11

    申请号:US17682025

    申请日:2022-02-28

    Inventor: Gaurav Bansal

    Abstract: A quantum computing based video alert system converts captured video and audio signals, in real time, into a sequence of video qubits and a sequence of audio qubits. An entanglement score is generated based on a comparison of the video qubits to historical video qubits that are verified to show malicious activity. A second entanglement score is generated based on a comparison of the audio qubits to historical audio qubits that are verified to show malicious activity. A probability score is generated for each segment of the video qubit sequence and for each segment of the audio qubit sequence. If the probability score for the video qubit sequence, the audio qubit sequence, or a combination of probability scores for both the video qubit sequence and the audio qubit sequence meet a threshold, then an alert is generated to identify possible malicious activity at the location of a CCTV camera capturing the real-time data.

    Quantum computing-based video alert system

    公开(公告)号:US11295583B1

    公开(公告)日:2022-04-05

    申请号:US17307642

    申请日:2021-05-04

    Inventor: Gaurav Bansal

    Abstract: A quantum computing based video alert system converts captured video and audio signals, in real time, into a sequence of video qubits and a sequence of audio qubits. An entanglement score is generated based on a comparison of the video qubits to historical video qubits that are verified to show malicious activity. A second entanglement score is generated based on a comparison of the audio qubits to historical audio qubits that are verified to show malicious activity. A probability score is generated for each segment of the video qubit sequence and for each segment of the audio qubit sequence. If the probability score for the video qubit sequence, the audio qubit sequence, or a combination of probability scores for both the video qubit sequence and the audio qubit sequence meet a threshold, then an alert is generated to identify possible malicious activity at the location of a CCTV camera capturing the real-time data.

    REAL-TIME KNOWLEDGE-BASED WIDGET PRIORITIZATION AND DISPLAY

    公开(公告)号:US20210065202A1

    公开(公告)日:2021-03-04

    申请号:US16555034

    申请日:2019-08-29

    Abstract: Aspects of the disclosure relate to real-time knowledge-based widget prioritization and display. A computing platform may detect, via a computing device, a voice-based interaction between an enterprise agent and a customer. Then, the computing platform may cause, via the computing device, the voice-based interaction to be captured as audio data. The computing platform may then transform the audio data to textual data. Subsequently, the computing platform may identify, in the textual data, a customer query. Then, the computing platform may retrieve, in real-time and based on the voice-based interaction and from a repository of widgets, a first widget, where the first widget includes information at least partially responsive to the customer query. Then, the computing platform may display, to the enterprise agent and via a graphical user interface in use by the enterprise agent, the first widget.

    Server scheduling tool
    4.
    发明授权

    公开(公告)号:US10474498B2

    公开(公告)日:2019-11-12

    申请号:US15903263

    申请日:2018-02-23

    Abstract: An apparatus includes a memory and a hardware processor. The memory stores one or more scheduling histories. The processor receives a first list from a first client device and a second list from a second client device. The first list includes a first job and the second list includes a second job. The processor calculates a first resource requirement to execute the first job and a second resource requirement to execute the second job. The processor determines that a conflict exists between the first job and the second job and in response, communicates messages to the first and second client devices indicating the conflict and proposed times for executing the jobs. The processor determines based on responses to the messages, execution times for the first and second jobs, assigns permission identifiers to the first and second jobs, and communicates a schedule.

    Software development system
    5.
    发明授权

    公开(公告)号:US11755295B2

    公开(公告)日:2023-09-12

    申请号:US17339236

    申请日:2021-06-04

    CPC classification number: G06F8/36 G06F9/541 G06F40/186 G06F40/40 G06N20/00

    Abstract: According to certain embodiments, a software development system comprises memory and a processor operably coupled to the memory. The memory is operable to store a plurality of code templates, each coded according to syntax of a respective programming language. The processor is configured to receive a user instruction in natural language and perform processing of the user instruction to yield a structured user instruction. The processor is further configured to determine a pre-defined structure that maps to the structured user instruction, select a code template associated with the pre-defined structure that maps to the structured user instruction, and use the selected code template to generate software code that implements functionality of the structured user instruction according to the syntax of the respective programming language of the selected code template.

    SOFTWARE DEVELOPMENT SYSTEM
    6.
    发明申请

    公开(公告)号:US20220391181A1

    公开(公告)日:2022-12-08

    申请号:US17339236

    申请日:2021-06-04

    Abstract: According to certain embodiments, a software development system comprises memory and a processor operably coupled to the memory. The memory is operable to store a plurality of code templates, each coded according to syntax of a respective programming language. The processor is configured to receive a user instruction in natural language and perform processing of the user instruction to yield a structured user instruction. The processor is further configured to determine a pre-defined structure that maps to the structured user instruction, select a code template associated with the pre-defined structure that maps to the structured user instruction, and use the selected code template to generate software code that implements functionality of the structured user instruction according to the syntax of the respective programming language of the selected code template.

    DYNAMIC PASSWORD GENERATION
    7.
    发明申请

    公开(公告)号:US20220215087A1

    公开(公告)日:2022-07-07

    申请号:US17140005

    申请日:2021-01-01

    Abstract: Systems, methods and apparatus are provided for altering a static password between entry and authentication using a dynamic logic. A client application may receive entry of a user password and record an amount of pressure associated with the entry. The client application may dynamically select a virtual contact surface material and generate audio files corresponding to writing or typing the password characters on the selected surface material with the recorded amount of pressure. The client application may compress the audio files by embedding them within the same digital space according to a time-based logic. The dynamic password files may be routed to a central server. Data packet fragmentation may further improve security during transmission. The central server may reconstruct the password for authentication using the time-based logic.

    SYSTEM FOR UTILIZING RESOURCES FROM MULTIPLE SOURCES TO COMPLETE A RESOURCE DISTRIBUTION

    公开(公告)号:US20220029928A1

    公开(公告)日:2022-01-27

    申请号:US17490708

    申请日:2021-09-30

    Abstract: Embodiments of the invention are directed to systems, methods and computer program products for utilizing resources from multiple sources to complete a resource distribution. The invention may receive a distribution request from an entity, where the distribution request includes information identifying a first resource distribution device provided by a user to the entity, a first source associated with the user, and a request amount of resources. The invention may determine whether the requested amount of resources is greater than a first amount of resources in the first source, determine whether the first resource distribution device is associated with one or more other sources associated with the user, and determine whether a sum of the first amount of resources in the first source and a second amount of resources in the one or more other sources is greater than or equal to the requested amount of resources.

    REAL-TIME INTELLIGENCE ENGINE FOR DATA ASSET DISCOVERY

    公开(公告)号:US20210165790A1

    公开(公告)日:2021-06-03

    申请号:US16700496

    申请日:2019-12-02

    Abstract: Systems, computer program products, and methods are described herein for providing real-time intelligence engine for data asset discovery. The present invention is configured to receive an indication that a first user has initiated a creation of a first multi-dimensional cube using a first computing node; initiate an asset recovery engine on the first computing device to: compare attributes associated with the first multi-dimensional cube with attributes associated with the multi-dimensional cubes stored on the first edge computing unit of the first computing node to determine a match; retrieve a first configuration file associated with the subset of the one or more multi-dimensional cubes stored on the first edge computing unit of the first computing node; and execute the creation of the first multi-dimensional cube based on the first configuration file using the first computing node.

    DATABASE QUERY TOOL
    10.
    发明申请
    DATABASE QUERY TOOL 审中-公开

    公开(公告)号:US20200334263A1

    公开(公告)日:2020-10-22

    申请号:US16900953

    申请日:2020-06-14

    Abstract: A memory stores a first log and a collection of queries. A processor accesses a second log that includes a first, second, third and fourth historical query, determines that the first and second historical queries belong to a first similarity group and the third and fourth historical queries belong to a second similarity group, and ranks the queries within groups based on static and dynamic features. The processor further determines the third historical query is frequently submitted and copies the highest ranked similar queries into the collection. The processor receives a first database query, stores it in both logs, determines it is not similar to queries stored in memory, further determines that it belongs to the first similarity group, copies the highest ranked similar queries to the first log, and returns a report containing the similar queries. The processor further receives and executes a second query selected from the report.

Patent Agency Ranking