Fog drone fleet orchestrator
    1.
    发明授权

    公开(公告)号:US10586186B2

    公开(公告)日:2020-03-10

    申请号:US15147605

    申请日:2016-05-05

    Abstract: Embodiments herein describe a fog drone that selects, organizes, monitors, and controls a plurality of drones in a fleet. The fog drone receives a job to be completed from a dispatcher and identifies the resources for accomplishing the job such as the amount of material (e.g., fiber optic cable) or the type of drones (e.g., drones with RF antennas or digging implements) needed to execute the job. Using the identified resources, the fog drone estimates the number of drones needed to complete the job and can recruit available drones to form the fleet. Once the fleet is formed, the fog drone determines a number of drones to place on standby to replace active drones if those drones need to recharge or malfunction.

    Minimizing productivity loss in a collaborative sharing environment

    公开(公告)号:US10462194B2

    公开(公告)日:2019-10-29

    申请号:US14618532

    申请日:2015-02-10

    Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.

    MINIMIZING PRODUCTIVITY LOSS IN A COLLABORATIVE SHARING ENVIRONMENT
    4.
    发明申请
    MINIMIZING PRODUCTIVITY LOSS IN A COLLABORATIVE SHARING ENVIRONMENT 审中-公开
    最小化合作共享环境中的生产力损失

    公开(公告)号:US20160234258A1

    公开(公告)日:2016-08-11

    申请号:US14618532

    申请日:2015-02-10

    CPC classification number: H04L65/1069 H04L67/025 H04L67/141 H04L67/38

    Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.

    Abstract translation: 根据本公开的一个或多个实施例,本地网络设备与通信网络中的远程网络设备建立通信会话,并且从多个可由本地网络设备执行的程序指定至少一个程序以供远程访问 网络设备产生指定的程序。 本地网络设备还生成共享显示对象,并且将每个指定的节目与共享的显示对象相关联以允许其显示。 本地网络设备进一步实例化与共享显示对象相关联的一个或多个共享控制对象,并且使用一个或多个共享控制对象中的至少一个来促进对远程网络设备的每个指定程序的访问。

    MINIMIZING PRODUCTIVITY LOSS IN A COLLABORATIVE SHARING ENVIRONMENT

    公开(公告)号:US20200059498A1

    公开(公告)日:2020-02-20

    申请号:US16665162

    申请日:2019-10-28

    Abstract: According to one or more embodiments of the disclosure, a local network device establishes a communication session with a remote network device in the communication network, and designates at least one program from a plurality of programs executable by the local network device for access by the remote network device to yield a designated program. The local network device further generates a shared display object, and associates each designated program with the shared display object to permit display thereof. The local network device further instantiates one or more shared control objects associated with the shared display object, and facilitate access to each designated program for the remote network device using at least one of the one or more shared control objects.

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20190068552A1

    公开(公告)日:2019-02-28

    申请号:US16173383

    申请日:2018-10-29

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    DELEGATED ACCESS CONTROL OF AN ENTERPRISE NETWORK

    公开(公告)号:US20170149784A1

    公开(公告)日:2017-05-25

    申请号:US14950418

    申请日:2015-11-24

    CPC classification number: H04L63/0209 H04L63/0815 H04L63/102

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    Delegated access control of an enterprise network

    公开(公告)号:US10757073B2

    公开(公告)日:2020-08-25

    申请号:US16173383

    申请日:2018-10-29

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

    Delegated access control of an enterprise network

    公开(公告)号:US10158605B2

    公开(公告)日:2018-12-18

    申请号:US14950418

    申请日:2015-11-24

    Abstract: Presented herein are techniques for enabling delegated access control of an enterprise network. In particular, data representing a trust chain formed between a local domain and a remote domain is stored in an identity management system. The local domain has an associated secure enterprise computing network and wherein the trust chain identifies one or more outside entities associated with the remote domain that are authorized to access the secure enterprise computing network. The identity management system receives a request for access to the secure enterprise computing network by a first outside entity of the one or more outside entities associated with the remote domain. Access by the outside entity to the secure enterprise computing network is controlled/determined based on an analysis of the trust chain.

Patent Agency Ranking