User authentication
    1.
    发明授权

    公开(公告)号:US11308187B2

    公开(公告)日:2022-04-19

    申请号:US16473332

    申请日:2017-04-11

    Abstract: Examples associated with user authentication are described. One example system includes a set of authentication modules. A data store stores data describing disruption ratings of members of the set of authentication modules. A user confidence module maintains a confidence rating that a current user of a device is an authenticated user of the device. The confidence module controls execution of the authentication modules based on the confidence rating and on the disruption ratings of the authentication modules. The user confidence module controls execution of relatively less disruptive authentication modules when the user confidence module is confident that the current user of the device is the authenticated user of the device. The user confidence module maintains the confidence rating based on feedback received from authentication modules.

    Installing an Application into a Virtualized Environment
    8.
    发明申请
    Installing an Application into a Virtualized Environment 有权
    将应用程序安装到虚拟化环境中

    公开(公告)号:US20160041818A1

    公开(公告)日:2016-02-11

    申请号:US14872505

    申请日:2015-10-01

    Inventor: James M. Mann

    CPC classification number: G06F8/61 G06F9/45558

    Abstract: An electronic device has a plurality of virtualized environments. Selection of an application of an application store is received, and a virtualized environment is identified for installing the application selected from the application store.

    Abstract translation: 电子设备具有多个虚拟化环境。 接收应用程序存储的应用程序的选择,并且识别虚拟化环境以安装从应用程序存储库中选择的应用程序。

    HOST A CONFERENCE CALL
    10.
    发明申请

    公开(公告)号:US20190342108A1

    公开(公告)日:2019-11-07

    申请号:US16511370

    申请日:2019-07-15

    Abstract: Examples disclosed herein relate to a conference call host. Examples include to establishing, by a first computing system, a first secure connection to a second computing system via a wireless network in response to receiving a secure connection request from the second computing system; the first computing system and the second computing system are in physical proximity to each other. Examples include to provide an operating system session to the second computing system through the secure connection while the first computing system and the second computing system remain in physical proximity to each other; the operating system is stored on and executable by the first computing system. Examples include to provide a connection to a conferencing platform to the second computing system via the first secure connection, the conference call at least among the first computing system, the second computing system, and a remote user.

Patent Agency Ranking