G06F21/31

Virtually modeling clothing based on 3D models of customers

Three-dimensional models (or avatars) may be defined based on imaging data captured from a customer. The avatars may be based on a virtual mannequin having one or more dimensions in common with the customer, a body template corresponding to the customer, or imaging data captured from the customer. The avatars are displayed on displays or in user interfaces and used for any purpose, such as to depict how clothing will appear or behave while being worn by a customer alone or with other clothing. Customers may drag-and-drop images of clothing onto the avatars. One or more of the avatars may be displayed on any display, such as a monitor or a virtual reality headset, which may depict the avatars in a static or dynamic mode. Images of avatars and clothing may be used to generate print catalogs depicting the appearance or behavior of the clothing while worn by the customer.

Virtually modeling clothing based on 3D models of customers

Three-dimensional models (or avatars) may be defined based on imaging data captured from a customer. The avatars may be based on a virtual mannequin having one or more dimensions in common with the customer, a body template corresponding to the customer, or imaging data captured from the customer. The avatars are displayed on displays or in user interfaces and used for any purpose, such as to depict how clothing will appear or behave while being worn by a customer alone or with other clothing. Customers may drag-and-drop images of clothing onto the avatars. One or more of the avatars may be displayed on any display, such as a monitor or a virtual reality headset, which may depict the avatars in a static or dynamic mode. Images of avatars and clothing may be used to generate print catalogs depicting the appearance or behavior of the clothing while worn by the customer.

Sensor block

Embodiments of the present disclosure include apparatuses and methods for sensor blocking. In a number of embodiments, a method can include operating a sensor block of an apparatus in a first mode to allow a sensor to receive inputs, and operating the sensor block in a second mode to inhibit the sensor from receiving the inputs. A sensor block can be used to prevent a sensor, such as an image sensor, from receiving an input, such as a light source input, to capture image data. A sensor block can be used to prevent a sensor from capturing image data even when an application causing to the sensor to operate, such as when applications have access to the sensor, but the user of a device is unaware that an application is using the sensor. The sensor block can be used to prevent the sensor from capturing useful images and the sensor can only capture a black image of the sensor block and not the surroundings of the device.

Sensor block

Embodiments of the present disclosure include apparatuses and methods for sensor blocking. In a number of embodiments, a method can include operating a sensor block of an apparatus in a first mode to allow a sensor to receive inputs, and operating the sensor block in a second mode to inhibit the sensor from receiving the inputs. A sensor block can be used to prevent a sensor, such as an image sensor, from receiving an input, such as a light source input, to capture image data. A sensor block can be used to prevent a sensor from capturing image data even when an application causing to the sensor to operate, such as when applications have access to the sensor, but the user of a device is unaware that an application is using the sensor. The sensor block can be used to prevent the sensor from capturing useful images and the sensor can only capture a black image of the sensor block and not the surroundings of the device.

Permissions-aware search with intelligent activity tracking and scoring across group hierarchies

Methods and apparatuses for providing a permissions-aware search and knowledge management system that incorporates user suggested results, document verification, and intelligent user activity tracking across group hierarchies to improve the quality and relevance of search results are described. The permissions-aware search and knowledge management system may enable content stored across a variety of local and cloud-based data stores to be indexed, searched, and displayed to authorized users. The identification and ranking of relevant documents corresponding with a user's search query may take into account user suggested results from the user and others assigned to the same group as the user, whether the underlying content of a search result was verified by a content owner as being up-to-date, the amount of time that has passed since the underlying content was verified by the content owner, and the recent activity of the user and related group members.

Permissions-aware search with intelligent activity tracking and scoring across group hierarchies

Methods and apparatuses for providing a permissions-aware search and knowledge management system that incorporates user suggested results, document verification, and intelligent user activity tracking across group hierarchies to improve the quality and relevance of search results are described. The permissions-aware search and knowledge management system may enable content stored across a variety of local and cloud-based data stores to be indexed, searched, and displayed to authorized users. The identification and ranking of relevant documents corresponding with a user's search query may take into account user suggested results from the user and others assigned to the same group as the user, whether the underlying content of a search result was verified by a content owner as being up-to-date, the amount of time that has passed since the underlying content was verified by the content owner, and the recent activity of the user and related group members.

Client certificate authentication in multi-node scenarios

A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information.

Modular blood glucose control systems

Blood glucose control systems are disclosed. A blood glucose control system can receive a glucose level signal from a glucose sensor operatively coupled to a subject. The system can decode encoded data of the glucose level signal to obtain the glucose level of the subject and the indication of the glucose trend. The system can automatically calculate the dose control signal using a control algorithm configured to calculate regular correction boluses of glucose control agent in response to at least the glucose level of the subject. The system can select a dose control signal encoding profile from a plurality of dose control signal encoding profiles and, based on the dose control signal encoding profile, encode the dose control signal such that the pump controller can read the dose control signal. The system can transmit an encoded dose control signal to the pump controller.

Modular blood glucose control systems

Blood glucose control systems are disclosed. A blood glucose control system can receive a glucose level signal from a glucose sensor operatively coupled to a subject. The system can decode encoded data of the glucose level signal to obtain the glucose level of the subject and the indication of the glucose trend. The system can automatically calculate the dose control signal using a control algorithm configured to calculate regular correction boluses of glucose control agent in response to at least the glucose level of the subject. The system can select a dose control signal encoding profile from a plurality of dose control signal encoding profiles and, based on the dose control signal encoding profile, encode the dose control signal such that the pump controller can read the dose control signal. The system can transmit an encoded dose control signal to the pump controller.

Integrated touchscreen and external controller

A touch sensor system includes touch sensors, drive-sense circuits (DSCs), memory, and a processing module. A DSC drives a first signal via a single line coupling to a touch sensor and simultaneously senses, when present, a second signal that is uniquely associated with a user. The DSC processes the first signal and/or the second signal to generate a digital signal that is representative of an electrical characteristic of the touch sensor. The processing module executes operational instructions (stored in the memory) to process the digital signal to detect interaction of the user with the touch sensor and to determine whether the interaction of the user with the touch sensor compares favorably with authorization. When not authorized, the processing module aborts execution of operation(s) associated with the interaction of the user with the touch sensor. Alternatively, when authorized, the processing module facilitates execution of the operation(s).