Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 36. Отображено 28.
06-12-2016 дата публикации

Providing restricted access to given devices by constructing abstract devices

Номер: US0009516033B2

Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping.

Подробнее
13-07-2017 дата публикации

Securing Deployments Using Command Analytics

Номер: US20170201541A1
Принадлежит: International Business Machines Corp

Methods, systems, and computer program products for securing deployments using command analytics are provided herein. A computer-implemented method includes collecting command sequences sent from one or more applications to one or more of a distributed group of multiple devices within a network; detecting one or more invalid command sequences and/or one or more out-of-sequence command sequences among the collected command sequences, wherein said detecting comprises comparing the collected command sequences against a repository of historical data of valid command sequences pertaining to the distributed group of multiple devices within the network; generating an alert upon a deteimination that one of the collected command sequences does not match an entry in the repository; and performing one or more remedial actions based on the generated alert.

Подробнее
29-08-2017 дата публикации

Method and system for securing the entry of data to a device

Номер: US0009749137B2

Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device.

Подробнее
10-04-2018 дата публикации

Self-driving vehicle sensor fault remediation

Номер: US0009940761B2

Methods, systems, and computer program products for self-driving vehicle sensor fault remediation are provided herein. A computer-implemented method includes detecting a fault in one or more sensors of a self-driving vehicle; determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, and (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle; generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; and outputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle.

Подробнее
22-11-2012 дата публикации

System for Collaborative Content Creation on the Telecom Web

Номер: US20120294197A1
Принадлежит: International Business Machines Corp

A system and method that enables the collaborative creation and editing of content on a VoiceSite over a telephone. The system and method enables the collaborative creation and editing of content on the VoiceSite by allowing one or multiple users (authors) to generate and edit the content of the VoiceSite at the same or different times. A Collaboration Manager is utilized to manage calls to/from one or more users. A VoiGen component utilizes voice-activated prompts to allow the one or more users to perform at least one of specify user preferences, load templates, store user preferences and service options, parse through obtained data, and generate/edit the VoiceSite based on the inputs provided by the one or multiple users. A Session Manager stores user specific information and ensures that the content provided by multiple users, including edits/changes, is integrated without conflicts.

Подробнее
22-11-2012 дата публикации

System and Method for Collaborative Content Creation on the Telecom Web

Номер: US20120294432A1
Принадлежит: International Business Machines Corp

A system and method that enables the collaborative creation and editing of content on a VoiceSite over a telephone. The system and method enables the collaborative creation and editing of content on the VoiceSite by allowing one or multiple users (authors) to generate and edit the content of the VoiceSite at the same or different times. A Collaboration Manager is utilized to manage calls to/from one or more users. A VoiGen component utilizes voice-activated prompts to allow the one or more users to perform at least one of specify user preferences, load templates, store user preferences and service options, parse through obtained data, and generate/edit the VoiceSite based on the inputs provided by the one or multiple users. A Session Manager stores user specific information and ensures that the content provided by multiple users, including edits/changes, is integrated without conflicts.

Подробнее
03-01-2013 дата публикации

Method for finding actionable communities within social networks

Номер: US20130006796A1
Принадлежит: International Business Machines Corp

A computer-implemented method that includes identifying a social network of a plurality of entities, each entity is associated with at least one other entity in the social network. A group of entities is identified from the plurality of entities that have expressed an interest in any one of a plurality of items. A primitive-community for each of the groups of entities is determined for each distinct item of the plurality of items. Common sets of entities are determined within each primitive-community associated with the each distinct item of the plurality of items based on a minimum support level, using a frequent itemset mining approach, where the first primitive community and the second primitive community are treated as transactions and entities are treated as items. A union including all distinct entities from the common sets of entities is determined from the common sets of entities.

Подробнее
03-01-2013 дата публикации

Method for finding actionable communities within social networks

Номер: US20130006880A1
Принадлежит: International Business Machines Corp

A non-transitory computer storage medium stores a method that includes identifying a social network of a plurality of entities, each entity being associated with at least one other entity in the social network. A group of entities is identified from the plurality of entities that have expressed an interest in any one of a plurality of items. A primitive-community for each of the groups of entities is determined for each distinct item of the plurality of items. Common sets of entities are determined within each primitive-community associated with the each distinct item of the plurality of items based on a minimum support level, using a frequent itemset mining approach, where the first primitive community and the second primitive community are treated as transactions and entities are treated as items.

Подробнее
06-06-2013 дата публикации

DESIGNING VIRAL MARKETING STRATEGIES FOR UP-SELLING AND CROSS-SELLING

Номер: US20130144694A1

Methods and arrangements for instituting a viral marketing strategy. Participants in a social network are ascertained. Mutual influence of the participants in purchasing decisions is determined, and purchasing influence of products on one another is assessed. At least one seed is selected from the participants for maximizing purchasing influence of one product on another product, based on mutual influence of the participants on one another. 112.-. (canceled)13. An apparatus comprising:at least one processor; anda computer readable storage medium having computer readable program code embodied therewith and executable by the at least one processor, the computer readable program code comprising:computer readable program code configured to ascertain participants in a social network;computer readable program code configured to determine mutual influence of the participants in purchasing decisions;computer readable program code configured to assess purchasing influence of products on one another; andcomputer readable program code configured to select at least one seed from the participants for maximizing purchasing influence of one product on another product, based on mutual influence of the participants on one another.14. A computer program product comprising:a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising:computer readable program code configured to ascertain participants in a social network;computer readable program code configured to determine mutual influence of the participants in purchasing decisions;computer readable program code configured to assess purchasing influence of products on one another; andcomputer readable program code configured to select at least one seed from the participants for maximizing purchasing influence of one product on another product, based on mutual influence of the participants on one another.15. The computer program product according to claim 14 ...

Подробнее
06-06-2013 дата публикации

DESIGNING VIRAL MARKETING STRATEGIES FOR UP-SELLING AND CROSS-SELLING

Номер: US20130144695A1

Methods and arrangements for instituting a viral marketing strategy. Participants in a social network are ascertained. Mutual influence of the participants in purchasing decisions is determined, and purchasing influence of products on one another is assessed. At least one seed is selected from the participants for maximizing purchasing influence of one product on another product, based on mutual influence of the participants on one another. 1. A method comprising:ascertaining participants in a social network;determining mutual influence of the participants in purchasing decisions;assessing purchasing influence of products on one another; andselecting at least one seed from the participants for maximizing purchasing influence of one product on another product, based on mutual influence of the participants on one another.2. The method according to claim 1 , wherein said assessing comprises assessing a supportive influence of one product on another product.3. The method according to claim 1 , wherein said assessing comprises assessing a competitive relationship between one product and another product.4. The method according to claim 1 , wherein said selecting comprises selecting at least one seed for maximizing up-sell potential of a product purchase by the at least one seed.5. The method according to claim 4 , wherein said selecting comprises employing a selling approximation algorithm.6. The method according to claim 1 , wherein said selecting comprises selecting at least one seed for maximizing cross-sell potential of a product purchase by the at least one seed.7. The method according to claim 6 , wherein said selecting comprises employing a selling approximation algorithm.8. The method according to claim 1 , wherein said selecting comprises employing a selling approximation algorithm.9. The method according to claim 8 , wherein said selecting comprises employing variables of: cost of providing a free sample of a first product to a seed claim 8 , cost of providing a ...

Подробнее
08-02-2018 дата публикации

SELF-DRIVING VEHICLE SENSOR FAULT REMEDIATION

Номер: US20180040171A1
Принадлежит:

Methods, systems, and computer program products for self-driving vehicle sensor fault remediation are provided herein. A computer-implemented method includes detecting a fault in one or more sensors of a self-driving vehicle; determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, and (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle; generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; and outputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle. 1. A computer-implemented method , comprising:detecting a fault in one or more sensors of a self-driving vehicle;determining a remedial action in response to the detected fault, wherein said determining comprises (i) comparing the fault to a database comprising (a) historical sensor fault information and (b) sensor fault remedy information, (ii) analyzing one or more items of contextual information pertaining to the location of the self-driving vehicle, and (iii) generating an estimated risk associated with the detected fault being dangerous to at least one of the self-driving vehicle, a passenger of the self-driving vehicle, and a pedestrian proximate to the self-driving vehicle;generating a signal comprising one or more instructions pertaining to carrying out the determined remedial action; andoutputting the generated signal to one or more remote-controlled pilotless airborne devices configured to remotely carry out the determined remedial action on the self-driving vehicle;wherein the steps are carried out by at least one computing device.2. The computer-implemented method of claim 1 , wherein the one ...

Подробнее
15-05-2014 дата публикации

Determining Potential Enterprise Partnerships

Номер: US20140136547A1
Принадлежит: International Business Machines Corp

Techniques, a system and an article of manufacture for determining potential enterprise partnerships. A method includes constructing an interaction graph for a set of multiple enterprises based on information pertaining to each of the enterprises and information pertaining to transactions conducted among the enterprises, and determining at least two candidate partnership teams among the set of enterprises based on at least one attribute of the graph, wherein each candidate partnership team comprises two or more of the enterprises. The method also includes computing a compatibility score for each pair of enterprises in each candidate partnership team based on at least one enterprise parameter, computing a compatibility score for each candidate partnership team based on an aggregation of the compatibility score for each pair of enterprises in each candidate partnership team, and outputting a suggested candidate partnership team based on selection of the highest compatibility score among the candidate partnership teams.

Подробнее
28-03-2019 дата публикации

Real-time multi-agent response based on a preference-based consensus

Номер: US20190095804A1
Принадлежит: International Business Machines Corp

A method and associated systems provide real-time response to a request received from a real-time system like a self-driving vehicle or a device that communicates interactively with its environment. The response is selected from a set of candidate feasible responses by a group of computerized agents that each sort the feasible responses in order of that agent's specific preferences, based on that agent's particular priorities or expertise. The agents then reconcile their differences through an iterative procedure. During each iteration, each agent decides whether to retain its current preferences or to adopt the preferences of another agent. This decision is made by determining which preferences are most similar to that agent's own initial preferences, and by which preferences would be most useful in helping to achieve that agent's particular goals. When the agents reach consensus, the group's most-preferred response is returned quickly enough to provide real-time, interactive response.

Подробнее
14-04-2016 дата публикации

Providing Restricted Access to Given Devices by Constructing Abstract Devices

Номер: US20160105441A1
Принадлежит:

Methods, systems, and computer program products for providing restricted access to given devices by constructing abstract devices are provided herein. A method includes generating a virtual device based on one or more physical devices; mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device; incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; and executing the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping. 1. A method comprising the following steps:generating a virtual device based on one or more physical devices;mapping multiple device actions of the one or more physical devices to multiple device actions of the virtual device exposed by the virtual device;incorporating (i) discretionary access control techniques, (ii) policy-based access control techniques, and (iii) a physical device-level partial ordering of actions to determine a resolution in response to a set of multiple user access requests for two or more of the multiple device actions of the virtual device; andexecuting the two or more device actions of the virtual device on the virtual device for one or more given users in accordance with said resolution by coordinating the execution of two or more corresponding device actions of the one or more physical devices on the one or more physical devices based on said mapping;wherein at least one of the steps is carried out by a computing device.2. The method of ...

Подробнее
19-05-2016 дата публикации

Method and system for securing the entry of data to a device

Номер: US20160142209A1
Принадлежит: International Business Machines Corp

Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device

Подробнее
30-05-2019 дата публикации

Smartphone monopod with use restriction enforcement

Номер: US20190162359A1
Принадлежит: International Business Machines Corp

A photographic monopod includes an extendable shaft, a bracket for fixing a photographic device at a first end of the extendable shaft, and a grip at a second end of the extendable shaft. The grip is opposite to the first end of the extendable shaft. The photo graphic monopod further includes a shutter control switch for controlling a shutter of the photographic device, and a shaft extension sensor for sensing a degree to which the extendable shaft is extended. The photographic monopod additionally includes a logic circuit for receiving the degree to which the extendable shaft is extended from the shaft extension sensor and disabling a connection between the shutter control switch and the photographic device when the degree to which the extendable shaft is extended exceeds a threshold.

Подробнее
06-06-2019 дата публикации

COGNITIVE EVENT BASED FILE SHARING SYSTEM FOR SOCIAL SOFTWARE

Номер: US20190173937A1
Принадлежит:

An embodiment may be a cognitive event based file sharing system. The embodiment may include receiving a file share request by a user, wherein the file share request comprises a file selected for access by intended file recipients. The embodiment may include determining a storage capacity of a computing device of the user. The embodiment may include determining a storage capacity of computing devices of the intended file recipients. The embodiment may include allocating the file based on the storage capacity of the computing device of the user, the storage capacity of the computing devices of the intended file recipients, and a file management policy. The embodiment may include providing access to the file to the intended file recipients. The embodiment may include removing a portion of the file from at least one of the computing devices of the intended file recipients based on the occurrence of a specified event. 1. A method for cognitive event based file sharing , the method comprising:receiving a file share request by a user, wherein the file share request comprises a file selected for access by one or more intended file recipients;determining a storage capacity of a computing device of the user;determining a storage capacity of one or more computing devices of the one or more intended file recipients;allocating the file based on the storage capacity of the computing device of the user, the storage capacity of the one or more computing devices of the one or more intended file recipients, and a file management policy;providing access to the file to the one or more intended file recipients; andremoving a portion of the file from at least one of the one or more computing devices of the one or more intended file recipients based on the occurrence of a specified event.2. The method of claim 1 , wherein allocating further comprises allocating the file based on the storage capacity of one or more computing devices of one or more third party users claim 1 , wherein each ...

Подробнее
05-07-2018 дата публикации

RESPONDING TO AN ELECTRONIC MESSAGE COMMUNICATED TO A LARGE AUDIENCE

Номер: US20180191657A1
Принадлежит:

A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people. 17-. (canceled)8. A system , comprising:a processor programmed to initiate executable operations comprising:identifying a first electronic message comprising first content being widely disseminated;analyzing the first content of the first electronic message and determining whether the first content satisfies at least a first criterion;responsive to determining that the first content of the first electronic message satisfies the at least the first criterion, automatically generating a second electronic message comprising second content;initiating communication of the second electronic message to a first set of people;monitoring responses by the first set of people to the second electronic message;determining whether the responses by the first set of people satisfy at least a second criterion; andresponsive to determining that the responses satisfy at least the second criterion, initiating communication of the second electronic message to at least a second set of people.9. The system of claim 8 , the executable operations further comprising:predicting a time when the second content will elicit the responses by the first set of ...

Подробнее
05-07-2018 дата публикации

RESPONDING TO AN ELECTRONIC MESSAGE COMMUNICATED TO A LARGE AUDIENCE

Номер: US20180191658A1
Принадлежит:

A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people. 1. A method , comprising:identifying a first electronic message comprising first content being widely disseminated;analyzing the first content of the first electronic message and determining whether the first content satisfies at least a first criterion;responsive to determining that the first content of the first electronic message satisfies the at least the first criterion, automatically generating, using a processor, a second electronic message comprising second content;initiating communication of the second electronic message to a first set of people;monitoring responses by the first set of people to the second electronic message;determining whether the responses by the first set of people satisfy at least a second criterion; andresponsive to determining that the responses satisfy at least the second criterion, initiating communication of the second electronic message to at least a second set of people.2. The method of claim 1 , further comprising:predicting a time when the second content will elicit the responses by the first set of people that satisfy at least the second criterion;wherein communication of the second ...

Подробнее
16-10-2014 дата публикации

METHOD AND SYSTEM FOR SECURING THE ENTRY OF DATA TO A DEVICE

Номер: US20140310531A1
Принадлежит:

A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device. 1. Crypto-glasses comprising:a frame configured so as to be worn by a user;a processor;a display device communicating with the processor so as to dynamically display data; anda communication unit connected to the processor and configured so as to transmit data to a device performing an authentication,wherein the data includes a key map which correlates data input into the device with keys of the device, the key map indicating data different from that visually indicated by the keys of the device.2. The crypto-glasses according to claim 1 , wherein the key map is generated by the device to be authenticated and to transmitted the crypto-glasses.3. The crypto-glasses according to claim 1 , further comprising a lens connected to the frame claim 1 ,wherein the display device comprises a projector configured so as to project an image on the lens of the crypto-glasses.4. The crypto-glasses according to claim 1 , wherein a new key map is generated after a predetermined event.5. The crypto-glasses according to claim 1 , wherein a new key map is generated after every key press.6. The crypto-glasses according to claim 1 , further comprising a biometric information input unit configured so as to authenticate biometric information of the user.7. The crypto-glasses according to claim 1 , wherein the communication unit is configured so as to pair with the device performing the authentication until a certain predetermined event occurs.8. The crypto-glasses according to claim 1 , further comprising an auditory device configured so as to provide feedback information relating to the key map to the user.9. A method of entering data into a device claim 1 , the method comprising:displaying in an optical unit a key map which correlates ...

Подробнее
08-08-2019 дата публикации

Cognitive Ranking of Terms Used During a Conversation

Номер: US20190243916A1
Принадлежит:

Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms. 1. A method , in a data processing system comprising at least one processor and at least one memory coupled to the at least one processor , wherein the at least one memory comprises instructions which are executed by the at least one processor to configure the data processing system to implement a conversation monitoring system , the method comprising:monitoring, by the conversation monitoring system executing on the data processing system, a conversation between at least two participants;extracting, by the conversation monitoring system, key terms present in communications between the at least two participants;generating, by the conversation monitoring system, a provenance graph data structure based on the extraction of the key terms, wherein the provenance graph data structure comprises speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph;analyzing, by the conversation monitoring system, the provenance graph data structure to identify a relative ...

Подробнее
08-08-2019 дата публикации

Cognitive Ranking of Terms Used During a Conversation

Номер: US20190243917A1
Принадлежит: International Business Machines Corp

Mechanisms are provided for implementing a conversation monitoring system. The conversation monitoring system monitors a conversation between at least two participants and extracting, by the conversation monitoring system, key terms present in communications between the at least two participants. The conversation monitoring system generates a provenance graph data structure based on the extraction of the key terms where the provenance graph data structure has speaker nodes representing the at least two participants, term nodes representing the key terms present in the communications, and edges connecting nodes in the provenance graph. The conversation monitoring system analyzes the provenance graph data structure to identify a relative ranking of the key terms within the conversation and generates an output representing content of the conversation based on the relative ranking of the key terms.

Подробнее
01-12-2009 дата публикации

Call flow modification based on user situation

Номер: US7627476B2
Принадлежит: International Business Machines Corp

The call flow of a user is modified based on the user's situation. A set of context-specific information regarding a user is collected, without prompting the user for this context-specific information within a call with the user. For instance, the context-specific information can include locational information regarding the user, weather information at the current location of the user, traffic information at the user's current location, proximity information of the user to a given transportation mode (airport, train station, and so on), as well as user preferences information. The situation of the user is determined based on the set of context-specific information collected, and the call flow of voice prompts to the user within the call is modified based on the situation determined.

Подробнее
21-08-2012 дата публикации

System and computer program product for predicting churners in a telecommunications network

Номер: US8249231B2
Принадлежит: International Business Machines Corp

Data pertaining to interactions between a plurality of customers is obtained. A graph is formed, having a plurality of nodes representing the customers and a plurality of edges representing interactions between the customers. A sub-set of the customers are denoted as previously churned customers. A spreading activation model is applied to the graph to identify, based on the graph and the previously churned customers, the potential churning customers.

Подробнее
01-03-2016 дата публикации

Method and system for securing the entry of data to a device

Номер: US9275213B2
Принадлежит: International Business Machines Corp

A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device.

Подробнее
12-08-2014 дата публикации

System for collaborative content creation on the telecom web

Номер: US8804921B2
Принадлежит: International Business Machines Corp

A system and method that enables the collaborative creation and editing of content on a VoiceSite over a telephone. The system and method enables the collaborative creation and editing of content on the VoiceSite by allowing one or multiple users (authors) to generate and edit the content of the VoiceSite at the same or different times. A Collaboration Manager is utilized to manage calls to/from one or more users. A VoiGen component utilizes voice-activated prompts to allow the one or more users to perform at least one of specify user preferences, load templates, store user preferences and service options, parse through obtained data, and generate/edit the VoiceSite based on the inputs provided by the one or multiple users. A Session Manager stores user specific information and ensures that the content provided by multiple users, including edits/changes, is integrated without conflicts.

Подробнее
23-10-2014 дата публикации

Method and system for securing the entry of data to a device

Номер: WO2014172161A1

A method and structure for entering authentication data into a device by displaying in an optical unit a key map which correlates data input into the device with keys of the device, the key map indicating data different from that of the keys of the device.

Подробнее
28-01-2016 дата публикации

Verfahren und System zur sicheren Dateneingabe in eine Einheit

Номер: DE112014001975T5
Принадлежит: International Business Machines Corp

Es werden ein Verfahren und eine Struktur zum Eingeben von Identitätsprüfungsdaten in eine Einheit durch Anzeigen einer Tastenzuordnung in einer optischen Einheit beschrieben, das die in die Einheit eingegebenen Daten den Tasten der Einheit zuordnet, wobei die Tastenzuordnung Daten anzeigt, die von denen der Tasten der Einheit verschieden sind.

Подробнее