Continuous video generation from voice data

    公开(公告)号:US11553159B1

    公开(公告)日:2023-01-10

    申请号:US17443121

    申请日:2021-07-21

    摘要: One example method includes capturing audio data at a client engine while outputting an output video, the output video being based upon an original video stored at the client engine, delivering the captured audio data to a prediction engine upon the captured audio data being captured for a pre-determined time, receiving from the prediction engine substitute frame data used by the client engine to stitch one or more frames into the original video stored at the client engine, and following stitching the one or more frames into the output video to generate an altered output video, outputting the captured audio data and the altered video from the client engine.

    RANDOM WALKS TO DETECT DISSIMILAR RECORDS

    公开(公告)号:US20220292305A1

    公开(公告)日:2022-09-15

    申请号:US17199965

    申请日:2021-03-12

    摘要: One example method includes identifying dissimilar items in a data set. A data set may be walked one or more times and the nodes or vertices of the data set may be scored based on the number of times the nodes are touched during the walks. Scores below a threshold score are determined to be dissimilar nodes in the data set. This allows a diverse set of nodes to be identified. A dissimilar data set may be used to prevent unintentional bias in algorithmic training.

    METHOD AND SYSTEM FOR VERIFYING SECRET DECRYPTION CAPABILITY OF ESCROW AGENTS

    公开(公告)号:US20220239504A1

    公开(公告)日:2022-07-28

    申请号:US17160680

    申请日:2021-01-28

    IPC分类号: H04L9/32 H04L29/06 H04L9/30

    摘要: A method for verifying a secret decryption of an escrow agent by a client operatively connected to the escrow agent includes initiating enrollment of the client with the escrow agent, wherein the enrollment results the escrow agent generating a key pair comprising a public key and a private key, obtaining the public key from the escrow agent, wherein the private key is not shared with the client, encrypting the secret with the public key to obtain an encrypted secret, after encrypting the secret, encrypting, based on a verification trigger, a verification value using the public key to obtain an encrypted verification value, sending the encrypted verification value to the escrow agent, obtaining a secret decryption response from the escrow agent, making a determination, based on the secret decryption response, that the escrow agent is not capable of decrypting the secret, and based on the determination, performing a remediation action.

    ANONYMIZED STORAGE OF MONITORING DATA

    公开(公告)号:US20220123919A1

    公开(公告)日:2022-04-21

    申请号:US17564694

    申请日:2021-12-29

    摘要: A system in one embodiment comprises a first endpoint device that is configured to communicate with a second endpoint device using a given communication protocol. The first endpoint device is configured to monitor a communication session under the given communication protocol and to generate monitoring data associated with the communication session. The first endpoint device is configured to determine that a designated network condition has occurred based at least in part on the monitoring data. The first endpoint device is configured to activate a performance monitoring component based at least in part on the determination that the designated network condition has occurred and to generate performance data utilizing the activated performance monitoring component. The first endpoint device is configured to anonymize and store the performance data.

    DYNAMIC APPLICATION DECOMPOSITION FOR EXECUTION IN A COMPUTING ENVIRONMENT

    公开(公告)号:US20210133066A1

    公开(公告)日:2021-05-06

    申请号:US16668676

    申请日:2019-10-30

    摘要: Techniques for dynamic decomposition of an application executing in a computing environment are provided. For example, an apparatus comprises at least one processing platform comprising one or more processing devices. The at least one processing platform is configured to execute a portion of an application program in a first virtual computing element, wherein the application program comprises one or more portions of marked code, receive a request for execution of one of the one or more portions of marked code, decide whether to execute the portion of marked code identified in the request in the first virtual computing element or in a second virtual computing element, and cause the portion of marked code identified in the request to be executed in the second virtual computing element, when it is decided to execute the portion of the marked code in the second virtual computing element.