AUTOMATED PARTICIPATION EVALUATOR
    1.
    发明申请

    公开(公告)号:US20200042916A1

    公开(公告)日:2020-02-06

    申请号:US16050344

    申请日:2018-07-31

    Abstract: Embodiments provide an automated participation evaluator, wherein processors are configured to evaluate participation of meeting attendees with respect to performance criteria including participation criteria and deliverable contribution criteria; populate object fields associated to ones of the performance criteria and attendees with values representing a quality of performance of the associated attendees relative to the associated performance criteria; notify the attendees of the populated object field values in response to determining that time for evaluating participation of the attendees with respect to performance criteria has not elapsed; update the populated object field values via reevaluating participation of the attendees in response to the notifying of the attendees of the populated values; and reward the attendees with reward values selected as a function of the updated, populated values, in response to determining time for evaluating the participation of the attendees with respect to each of the performance criteria has elapsed.

    SENSOR AGNOSTIC GESTURE DETECTION

    公开(公告)号:US20220121289A1

    公开(公告)日:2022-04-21

    申请号:US17075741

    申请日:2020-10-21

    Abstract: Described are techniques for sensor agnostic gesture detection. The techniques include recording a gesture using sensor output from a first user device to a first user profile associated with a ubiquitous gesture agent. The techniques further include associating the gesture with a triggering threshold indicating the gesture and based on the sensor output, and a processor-executable action that is executable by one of a plurality of user devices associated with the user profile. The techniques further include transforming the triggering threshold into a corresponding triggering threshold for a different type of sensor. The techniques further include identifying the gesture using data from the different type of sensor that satisfies the corresponding triggering threshold. The techniques further include implementing, by the one of the plurality of user devices, the processor-executable action associated with the gesture.

    DYNAMICALLY CUSTOMIZED COGNITIVE SECURITY FILTER

    公开(公告)号:US20210126952A1

    公开(公告)日:2021-04-29

    申请号:US16665215

    申请日:2019-10-28

    Abstract: A processor may identify a new application on a device. The processor may receive, from the device, user data. The user data may include user profile information and user activity information. The processor may evaluate the user data. The evaluating of the user data may include designating a security level to the user data. The processor may determine, from evaluating the user data, that a default security configuration for the new application is not secure. The processor may automatically generate a customized security configuration for the new application. The processor may apply the customized security configuration to the new application.

    NETWORK BANDWIDTH CONSERVATION DURING VIDEO CONFERENCING

    公开(公告)号:US20230065847A1

    公开(公告)日:2023-03-02

    申请号:US17446528

    申请日:2021-08-31

    Abstract: According to one embodiment, a method, computer system, and computer program product for network bandwidth conservation is provided. The embodiment may include monitoring eye focus of a user. The embodiment may include monitoring voice input of the user. In response to determining the eye focus of the user is on a video feed of another user for more than a threshold amount of focus time, the embodiment may include receiving the video feed of the another user. In response to determining the eye focus of the user is on a screen of a video conference and determining, based on the voice input, the user is speaking towards the screen of the video conference, the embodiment may include enabling a camera of the user and transmitting a video feed of the user.

    DIGITAL TWIN OBJECTS FOR PRODUCT PACKAGING COMPATIBILITY

    公开(公告)号:US20220382922A1

    公开(公告)日:2022-12-01

    申请号:US17303234

    申请日:2021-05-25

    Abstract: According to one embodiment, a method, computer system, and computer program product for determining packaging compatibility is provided. The embodiment may include creating a digital twin representation of a manufacturing object based on received data of the manufacturing object. The embodiment may include identifying a position of the digital twin representation within a hierarchy of associated digital twin representations. The embodiment may include monitoring for a change to the digital twin representation. The embodiment may include determining a compatibility of a changed digital twin representation within the hierarchy. In response to determining that the changed digital twin representation is incompatible within the hierarchy, the embodiment may include sending an incompatible change alert.

    AUTHENTICATION MECHANISM UTILIZING LOCATION CORROBORATION

    公开(公告)号:US20210136066A1

    公开(公告)日:2021-05-06

    申请号:US16670298

    申请日:2019-10-31

    Abstract: Described are techniques for collaboration-based authentication including a method comprising storing a user profile comprising information related to a user account, a plurality of user devices, and a user calendar. The method further comprises detecting an authentication attempt associated with the user account and retrieving device information associated with a first device initiating the authentication attempt, a first location of the first device, a second location of a second device of the plurality of user devices, and a scheduled location based on the user calendar. The method further comprises determining that the authentication attempt comprises a security risk based on the device information associated with the first device, the first location of the first device, the second location of the second device, and the scheduled location. The method further comprises performing a mitigation action in response to determining that the authentication attempt comprises the security risk.

Patent Agency Ranking