PERSONALIZED KEY OBJECT IDENTIFICATION IN A LIVE VIDEO STREAM

    公开(公告)号:US20200304839A1

    公开(公告)日:2020-09-24

    申请号:US16362678

    申请日:2019-03-24

    Abstract: Embodiments of the invention provide a method, system and computer program product for personalized key object detection in a live video stream. The method includes streaming a live video stream in a window of a computing device and during the streaming, collecting biophysical data of an end user viewing the playing back and responding to ones of the collected biophysical data that indicate a positive reaction by associating a contemporaneously displayed frame of the live video stream with the positive reaction. Thereafter, each corresponding frame associated with positive feedback can be processed by identifying key words presented in text of the feedback to the corresponding frame, matching the identified key words to a tag of an object visually presented in the corresponding frame, and storing a reference to the object in connection with the end user as an object of interest for which targeted marketing may be presented.

    Text resources processing in an application

    公开(公告)号:US10691474B2

    公开(公告)日:2020-06-23

    申请号:US15396948

    申请日:2017-01-03

    Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.

    Temporary interface to provide intelligent application access

    公开(公告)号:US11632397B2

    公开(公告)日:2023-04-18

    申请号:US16514607

    申请日:2019-07-17

    Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.

    Container based service management

    公开(公告)号:US10691504B2

    公开(公告)日:2020-06-23

    申请号:US15675828

    申请日:2017-08-14

    Abstract: A method, computer system, and a computer program product for migrating a service from one container to another container is provided. The present invention may include obtaining a first group of requests that are accessing a service launched in a first container instance and a second group of requests that are waiting for accessing the service. The present invention may also include generating a migrated service in a second container instance by migrating the service from the first container instance to the second container instance based on the obtained first and second groups of requests. The present invention may further include directing the second group of requests to the migrated service in the second container instance.

    TEMPORARY INTERFACE TO PROVIDE INTELLIGENT APPLICATION ACCESS

    公开(公告)号:US20190356698A1

    公开(公告)日:2019-11-21

    申请号:US16514607

    申请日:2019-07-17

    Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.

    TEXT RESOURCES PROCESSING IN AN APPLICATION
    6.
    发明申请

    公开(公告)号:US20180188914A1

    公开(公告)日:2018-07-05

    申请号:US15396948

    申请日:2017-01-03

    Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.

    TEXT RESOURCES PROCESSING IN AN APPLICATION
    7.
    发明申请

    公开(公告)号:US20200241898A1

    公开(公告)日:2020-07-30

    申请号:US16849184

    申请日:2020-04-15

    Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.

    TEMPORARY INTERFACE TO PROVIDE INTELLIGENT APPLICATION ACCESS

    公开(公告)号:US20190199750A1

    公开(公告)日:2019-06-27

    申请号:US15850215

    申请日:2017-12-21

    CPC classification number: H04L63/20 G06F21/31 H04L41/22 H04L63/10

    Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.

    CONTAINER BASED SERVICE MANAGEMENT
    9.
    发明申请

    公开(公告)号:US20190050272A1

    公开(公告)日:2019-02-14

    申请号:US15675828

    申请日:2017-08-14

    Abstract: A method, computer system, and a computer program product for migrating a service from one container to another container is provided. The present invention may include obtaining a first group of requests that are accessing a service launched in a first container instance and a second group of requests that are waiting for accessing the service. The present invention may also include generating a migrated service in a second container instance by migrating the service from the first container instance to the second container instance based on the obtained first and second groups of requests. The present invention may further include directing the second group of requests to the migrated service in the second container instance.

    ENHANCED COPY-AND-PASTE
    10.
    发明申请

    公开(公告)号:US20180276057A1

    公开(公告)日:2018-09-27

    申请号:US15465785

    申请日:2017-03-22

    CPC classification number: G06F9/543

    Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.

Patent Agency Ranking