-
公开(公告)号:US12041050B2
公开(公告)日:2024-07-16
申请号:US17651267
申请日:2022-02-16
IPC分类号: H04L9/40
CPC分类号: H04L63/0876 , H04L63/083 , H04L63/0884
摘要: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.
-
公开(公告)号:US20240208062A1
公开(公告)日:2024-06-27
申请号:US18145964
申请日:2022-12-23
IPC分类号: B25J9/16
CPC分类号: B25J9/1671 , B25J15/0066
摘要: A processor may receive environment data associated with a robotic device in an environment. The processor may analyze the environment data to identify one or more activities the robotic device may perform in the environment. The processor may generate one or more simulations associated with the one or more activities and the robotic device. The processor may determine one or more limitations of the robotic device associated with the one or more activities. The processor may identify, responsive to determining one or more limitations, one or more apparatuses. The one or more apparatuses may be associated with the one or more limitations.
-
公开(公告)号:US20240089292A1
公开(公告)日:2024-03-14
申请号:US17932049
申请日:2022-09-14
CPC分类号: H04L63/20 , G06F21/602 , G06F21/6218 , H04L63/0428 , H04L63/105
摘要: Systems, methods and/or computer program products for dynamically adjusting levels of data security, encryption enforcement, confidentiality, network policies and other parameters within a network and at processing nodes thereof, implementing heightened levels of security and encryption as needed, based on the type of datasets being processed. Enforcement and removal of data security, encryption requirements, confidentiality, network policies and other parameters at the nodes of the network is performed using headers and footers added to the source dataset. Headers prescribe the heightened level of security or encryption being enforced at each node of the network along the source dataset's flow trajectory, while footers follow the completed processing of the source dataset and indicates to the nodes along the data flow trajectory the conditions for removing the heightened level of security, encryption, confidentiality, network policies and other parameters prescribed by the headers.
-
公开(公告)号:US20240080756A1
公开(公告)日:2024-03-07
申请号:US17823978
申请日:2022-09-01
摘要: According to one embodiment, a method, computer system, and computer program product for eSIM configuration. The embodiment may include identifying contextual information of an internet-based activity being performed via a mobile device. The contextual information comprises one or more minimum performance requirements. The embodiment may include identifying a Wi-Fi network in use for performance of the internet-based activity. The embodiment may include evaluating the performance of the internet-based activity on the Wi-Fi network in use. In response to determining a deviation from the one or more minimum performance requirements, the embodiment may include reconfiguring an eSIM of the mobile device to compensate for the deviation.
-
公开(公告)号:US11924706B2
公开(公告)日:2024-03-05
申请号:US17447222
申请日:2021-09-09
摘要: A method, a computer program product, and a computer system manage notification settings on a user device within premises. The method includes determining a notification rule to be enforced on the premises for the notification settings to be set on the user device while within the premises. The method includes determining a location and a defined surrounding within the premises for managing the notification settings on the user device, the notification rule being based on the defined surrounding. The method includes determining a user device location of the user device within the premises. The method includes determining whether the user device location is within the defined surrounding. The method includes, as a result of the user device location being within the defined surrounding, transmitting instructions indicative of the notification rule to the user device to set the notification settings on the user device based on the notification rule.
-
公开(公告)号:US11902231B2
公开(公告)日:2024-02-13
申请号:US17650911
申请日:2022-02-14
摘要: An embodiment for dynamically displaying images based on textual content is provided. The embodiment may include receiving real-time textual content from a sender and a recipient. The embodiment may also include deriving a topic of the real-time textual content and a context associated with the real-time textual content. The embodiment may further include identifying a medium in which the real-time textual content is entered. The embodiment may also include predicting a digital image to be displayed to the sender. The embodiment may further include in response to determining the digital image is available in a digital library, selecting the digital image from the digital library and displaying the selected digital image to the sender. The embodiment may also include validating the selected digital image and displaying the validated selected digital image to the recipient.
-
公开(公告)号:US11782797B2
公开(公告)日:2023-10-10
申请号:US17345611
申请日:2021-06-11
CPC分类号: G06F11/1464 , G06F9/45558 , G06F11/1451 , H04L67/535 , G06F2009/45562 , G06F2009/45591
摘要: A method, system and computer program product for achieving activity centric computing. An activity (e.g., opening an application, opening an electronic communication, initiating a printing action, initiating a browsing session) performed by a user on a computing device is detected. In response to detecting the activity, the runtime environment is captured and the session workflow associated with the detected activity is recorded. The session workflow refers to the events performed by the user on the computing device in connection with performing an activity (e.g., application usage, web browsing) on the computing device. The captured runtime environment and the recorded session workflow associated with the detected activity are stored in a portable container. After receiving an indication to share the activity, an image of the container is created and stored in a repository to be shared among users to replay the session workflow associated with the activity.
-
公开(公告)号:US20230262058A1
公开(公告)日:2023-08-17
申请号:US17651267
申请日:2022-02-16
IPC分类号: H04L9/40
CPC分类号: H04L63/0876 , H04L63/083 , H04L63/0884
摘要: A method for authenticating a device based on a wireless power transmission signal includes receiving, at an authenticating device, a wireless power transmission signal for authentication of a user device attempting to accessing a resource, where the wireless power transmission signal includes a unique identifier for the user device. The method further includes translating, at the authenticating device, the wireless power transmission signal, wherein the unique identifier for the user device is embedded in the wireless power transmission signal as a bit representation. In response to authenticating the user device based on a translated wireless power transmission signal, the method further includes granting, the user device, access to the resource.
-
公开(公告)号:US20230262014A1
公开(公告)日:2023-08-17
申请号:US17650911
申请日:2022-02-14
IPC分类号: G06T11/00 , G06F40/30 , G06F3/01 , G06F40/169
CPC分类号: G06T11/00 , G06F40/30 , G06F3/017 , G06F40/169
摘要: An embodiment for dynamically displaying images based on textual content is provided. The embodiment may include receiving real-time textual content from a sender and a recipient. The embodiment may also include deriving a topic of the real-time textual content and a context associated with the real-time textual content. The embodiment may further include identifying a medium in which the real-time textual content is entered. The embodiment may also include predicting a digital image to be displayed to the sender. The embodiment may further include in response to determining the digital image is available in a digital library, selecting the digital image from the digital library and displaying the selected digital image to the sender. The embodiment may also include validating the selected digital image and displaying the validated selected digital image to the recipient.
-
10.
公开(公告)号:US20230244546A1
公开(公告)日:2023-08-03
申请号:US17588303
申请日:2022-01-30
发明人: Akash U. Dhoot , Madhu Akhilesham , Niteen D Lakhe , Venkata Vara Prasad Karri , Shailendra Moyal
CPC分类号: G06F9/5083 , G06N20/00 , G06N5/025
摘要: A computer-implemented method, system and computer program product for seamlessly adjusting the utilization of computational resources of a computing device. A pattern of usage of computational resources of the computing device over a timeframe is determined. An artificial intelligence model uses such a pattern of usage and/or any identified contextual needs for upgrading or downgrading the computational resources of the computing device to determine the predicted amount of computational resources needed to be utilized by the computing device. Based on such a predicted amount, a blockchain transaction may be initiated and recorded to upgrade/downgrade the computational resources of the computing device. The rules on a smart contract, which defines a subscription for utilizing an allocated portion of the computational resources by the user, associated with the computing device are then updated based on the blockchain transaction which adjusts the amount of computational resources available to be utilized by the user.
-
-
-
-
-
-
-
-
-