-
公开(公告)号:US10602599B2
公开(公告)日:2020-03-24
申请号:US14979120
申请日:2015-12-22
Applicant: Intel Corporation
Inventor: Rita H. Wouhaybi , Igor Tatourian , Hong Li , Lama Nachman
IPC: H05B37/02 , H05B47/175 , H05B47/11 , H05B47/105
Abstract: Technologies for light exposure analysis include a computer configured to collect light data of an environment and a remote computer communicatively coupled to the computer. The remote computer is configured to receive/retrieve health information for one or more users and analyze the health information to generate a health profile for each of the one or more users. Additionally, the remote computer is configured to determine whether any correlations exist between the health profiles and the light data. The remote computer is further configured to analyze the collected light data against one or more health profiles to determine a desired lighting condition for a user based at least in part on the correlations between the health profiles and the light data. Other embodiments are described and claimed.
-
公开(公告)号:US10313427B2
公开(公告)日:2019-06-04
申请号:US14495274
申请日:2014-09-24
Applicant: Intel Corporation
Inventor: Igor Tatourian , Rita H Wouhaybi , Hong Li , Tobias M Kohlenberg , Adam Jordan
Abstract: Technologies are presented that optimize application management on a computing device through contextual application archival and retrieval. A method of managing applications may include: learning contextual relevancy of one or more applications installed on a computing device to a user of the device and determining whether an application is no longer contextually relevant to the user. If the application is no longer contextually relevant, the device may send a request to an application management service to obtain and/or maintain the application; create a placeholder for the application at the device; and remove the application from the device. The device may monitor contextual inputs for relevancy of the archived application. If contextual relevancy is determined, the device may send a request to the service to provide the archived application or a replacement of the archived application to the device; receive the requested application; install the requested application; and remove the placeholder.
-
公开(公告)号:US10181052B2
公开(公告)日:2019-01-15
申请号:US14367992
申请日:2013-12-19
Applicant: Intel Corporation
Inventor: Hong Li , Sharad K. Garg , Mark D. Yarvis , Joshua Boelter
Abstract: Technologies for informing a remote user of a local user's availability to receive a contact on a communication device are disclosed. The availability of the local user may be determined based on the local user's context information, which may be reported to the remote user in response to a contact status request. The local user's context information provided to the remote user may inform, for example, whether the local user is available to receive a contact, the best way to contact the local user, and/or other context information of the local user. The type and/or level of specificity of the local user's context information reported to the remote user may be determined based on a privacy level, which may be determined based on the local user's context, the identity of the remote user, and/or other criteria. In some embodiments, contact status updates may be provided to the remote user.
-
公开(公告)号:US20180375854A1
公开(公告)日:2018-12-27
申请号:US16117285
申请日:2018-08-30
Applicant: INTEL CORPORATION
Inventor: Jim S. Baca , Tobias M. Kohlenberg , Hong Li , David Stanasolovich , Mark H. Price , Steven J. Birkel , Kenneth W. Reese , Ronald Tafoya
Abstract: Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
-
公开(公告)号:US10075434B2
公开(公告)日:2018-09-11
申请号:US15188258
申请日:2016-06-21
Applicant: Intel Corporation
Inventor: Jim S. Baca , Tobias M. Kohlenberg , Hong Li , David Stanasolovich , Mark H. Price , Steven J. Birkel , Kenneth W. Reese , Ronald Tafoya
Abstract: Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTP.
-
公开(公告)号:US10025294B2
公开(公告)日:2018-07-17
申请号:US14664321
申请日:2015-03-20
Applicant: Intel Corporation
Inventor: Igor Tatourian , Sudip S. Chahal , Greeshma Yellareddy , Norman Yee , Hong Li , Rita H. Wouhaybi , Tomer Rider
IPC: G06F19/00 , G05B19/4099
Abstract: Embodiments described herein relate generally to simulating apparel items. A matching computer system may receive a request for an apparel item. The matching computer system may identify a 3D pattern corresponding to the apparel item. The matching computer system may provide this 3D pattern to a user agent computer system. The user agent computer system may cause a 3D printer to print a 3D artifact or modify an existing 3D artifact to simulate the requested apparel item. The modification of 3D artifact may be based on the data collected by the sensor(s) attached to the user which indicate the fitting and/or user feelings of the 3D apparel. The user agent computer system may print or modify the 3D artifact to include components that simulate characteristics of the requested apparel item. The 3D artifact may provide feedback to the user agent computer system based on sensing measurements. Other embodiments may be described and/or claimed.
-
公开(公告)号:US09942317B2
公开(公告)日:2018-04-10
申请号:US14841121
申请日:2015-08-31
Applicant: Intel Corporation
Inventor: John B. Vicente , James R. Blakley , Hong Li , Mark D. Yarvis
CPC classification number: H04L67/1078 , G06F9/5072 , H04L67/04 , H04L67/10 , H04L67/1068 , H04W48/10 , H04W72/048 , H04W84/18
Abstract: Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes.
-
公开(公告)号:US09858478B2
公开(公告)日:2018-01-02
申请号:US14577965
申请日:2014-12-19
Applicant: Intel Corporation
Inventor: Igor Tatourian , Hong Li , Rita H Wouhaybi
CPC classification number: G06K9/0063 , G01C21/00 , G01C21/3415 , G06F17/30241 , G06F17/30244 , G06F17/3087 , G06K9/00651 , G06T3/0068 , G06T7/337 , G06T2207/30232 , G06T2207/30252 , G06T2210/61
Abstract: A system for transmitting notifications based on image data analysis may comprise: an image registration module to receive, from an unmanned aerial vehicle, current image data of a geographic location; a change detection module to: compare the current image data with previous image data of the geographic location to identify a change in the geographic location; and analyze the change to determine a category of the change in the geographic location; and an action module to: determine at least one party to notify about the change based on the category; and transmit a notification to the at least one party via an unmanned aerial vehicle.
-
公开(公告)号:US20170310775A1
公开(公告)日:2017-10-26
申请号:US15645714
申请日:2017-07-10
Applicant: Intel Corporation
Inventor: Igor Tatourian , Rita H. Wouhaybi , Hong Li , Tobias M. Kohlenberg
CPC classification number: H04L67/22 , H04L67/025 , H04L67/306 , H04W4/38 , H04W4/80
Abstract: Embodiments of apparatus and methods for providing recommendations based on environmental data and associated contextual information are described. In embodiments, an apparatus may include a data collector to receive environmental data and an analysis module to identify a behavioral model of the first user based at least in part on the environmental data associated contextual information of the first user. The apparatus may further include a recommendation module to provide a recommendation to the first user based at least in part on the behavioral model of the first user and/or environmental data for a second user. Other embodiments may be described and/or claimed.
-
公开(公告)号:US09794228B2
公开(公告)日:2017-10-17
申请号:US14933593
申请日:2015-11-05
Applicant: Intel Corporation
Inventor: Hong Li , Rita H Wouhaybi , Tobias Kohlenberg
CPC classification number: H04L63/0281 , G06F21/31 , G06F21/316 , G06F2221/2103 , H04L63/083 , H04L63/1408
Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.
-
-
-
-
-
-
-
-
-