CONTEXT DEPENDENT REACTIONS DERIVED FROM OBSERVED HUMAN RESPONSES
    21.
    发明申请
    CONTEXT DEPENDENT REACTIONS DERIVED FROM OBSERVED HUMAN RESPONSES 审中-公开
    从观察到的人类反应中获得的背景相关反应

    公开(公告)号:US20160039097A1

    公开(公告)日:2016-02-11

    申请号:US14454375

    申请日:2014-08-07

    Abstract: Computer-readable storage media, apparatuses, and methods associated with context dependent reactions derived from human responses are disclosed herein. An apparatus may, in some embodiments, include a communication module and a reaction agent. The reaction agent may be configured to transmit, via the communication module, a request to a remote data source. The request may include context data indicative of an operational context of the apparatus. The reaction agent may receive, in response to the request, via the communication module, reaction data for the apparatus to react to the operational context. In embodiments, the reaction data may be derived from previous observations of human response to a context similar to the operational context indicated by the context data of the request. Other embodiments may be described and/or claimed herein.

    Abstract translation: 本文公开了与来自人类反应的上下文相关反应相关的计算机可读存储介质,装置和方法。 在一些实施例中,装置可以包括通信模块和反应剂。 反应剂可经配置以经由通信模块向远程数据源发送请求。 该请求可以包括指示装置的操作上下文的上下文数据。 响应于该请求,反应剂可经由通信模块接收用于对操作上下文作出反应的装置的反应数据。 在实施例中,反应数据可以从先前对人类对类似于由请求的上下文数据指示的操作上下文的上下文的响应的观察得到。 在此可以描述和/或要求保护其他实施例。

    Security challenge assisted password proxy
    22.
    发明授权
    Security challenge assisted password proxy 有权
    安全挑战协助密码代理

    公开(公告)号:US09223950B2

    公开(公告)日:2015-12-29

    申请号:US13785094

    申请日:2013-03-05

    Abstract: Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device.

    Abstract translation: 这里描述了使用上下文数据来认证个人并防止安全漏洞的身份验证的系统,装置和方法。 示例性代理引擎可以监视与计算设备的交互以获得用户唯一的上下文数据。 上下文数据可以用于响应于访问安全资源的请求而产生独特的挑战问题,并且可以消除用户记住访问资源的凭据的需要。 挑战性问题可能仅限于一次性使用,并且与资源的价值成比例地变化。 响应于挑战问题的正确答复,代理引擎可以访问包含授权访问资源的凭据的保管库。 保险库和代理引擎可以完全包含在计算设备上,或者它们可以在通过计算设备上的应用或接口访问的远程设备上实现。

    Technologies for detection of anomalies in vehicle traffic patterns

    公开(公告)号:US11482100B2

    公开(公告)日:2022-10-25

    申请号:US14672102

    申请日:2015-03-28

    Abstract: Technologies for monitoring vehicle traffic include a traffic analysis server that receives infrastructure data from infrastructure sensors positioned along a road segment of a road and vehicle data from one or more vehicles travelling along the road segment. The traffic analysis server determines whether anomalies are present in the traffic data through the road segment based on an expected traffic behavior for the road segment. The traffic analysis server determines the expected traffic behavior for the road segment in a particular time window based on a historical traffic pattern associated with the road segment, based on historical vehicle data and historical infrastructure data captured during a prior time window corresponding to the particular time window for that road segment. Other embodiments are described and claimed.

    Supervised Online Identity
    25.
    发明申请

    公开(公告)号:US20220029999A1

    公开(公告)日:2022-01-27

    申请号:US17366800

    申请日:2021-07-02

    Abstract: Technologies to facilitate supervision of an online identify include a gateway server to facilitate and monitor access to an online service by a user of a “child” client computer device. The gateway server may include an identity manager to receive a request for access to the online service from the client computing device, retrieve access information to the online service, and facilitate access to the online service for the client computing device using the access information. The access information is kept confidential from the user. The gateway server may also include an activity monitor module to control activity between the client computing device and the online service based on the set of policy rules of a policy database. The gateway server may transmit notifications of such activity to a “parental” client computing device for review and/or approval, which also may be used to update the policy database.

    Cloud federation as a service
    26.
    发明授权

    公开(公告)号:US11044305B2

    公开(公告)日:2021-06-22

    申请号:US16370447

    申请日:2019-03-29

    Inventor: Hong Li

    Abstract: A Cloud federator may be used to allow seamless and transparent access by a Cloud Client to Cloud services. Federation may be provided on various terms, including as a subscription based real-time online service to Cloud Clients. The Cloud federator may automatically and transparently effect communication between the Cloud Client and Clouds and desired services of the Clouds, and automatically perform identity federation. A Service Abstraction Layer (SAL) may be implemented to simplify Client communication, and Clouds/Cloud services may elect to support the SAL to facilitate federation of their services.

    CLOUD DATA STORAGE LOCATION MONITORING

    公开(公告)号:US20210037097A1

    公开(公告)日:2021-02-04

    申请号:US16814439

    申请日:2020-03-10

    Abstract: Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed.

    Community drone monitoring and information exchange

    公开(公告)号:US10522048B2

    公开(公告)日:2019-12-31

    申请号:US16270919

    申请日:2019-02-08

    Abstract: A method may include receiving, using at least one processor, location information that includes a location of an unmanned aerial vehicle (UAV); querying, using the at least one processor, a policy database to retrieve a notification condition for a first property with respect to UAVs; calculating, using the at least one processor, a distance between the UAV and the first property using the received location information determining, using the at least one processor, if the distance of the UAV with respect to the first property is within a range defined in the notification condition for the first property; and transmitting, using the at least one processor, a notification to a party associated with the first property when the distance of the UAV with respect to the first property is within the range defined in the notification condition for the first property.

Patent Agency Ranking