Patent classifications
G06F21/1013
SYSTEMS AND METHODS FOR CONTENT RIGHTS PORTABILITY
The system and methods described allow a content delivery application to provide temporary access to a content item for display on a content access device based on a user obtaining access to the content item initially on another system. The content delivery application receives content accessed confirmation that user access a content item and then monitors whether that access was interrupted. If the access was interrupted, the content delivery application generates a content access bookmark based on a content timeline and stores a content access authorization comprising the content access bookmark and an identifier from the profile. When the user requests the content item, the content delivery application transmits access information corresponding to segments of the content item, based on the content access bookmark to a user's device.
Systems and methods for generating and facilitating access to a personalized augmented rendering of a user
Systems and methods for generating and facilitating access to a personalized augmented rendering of a user to be presented in an augmented reality environment are discussed herein. The augmented rendering of a user may be personalized by the user to comprise a desired representation of the user in an augmented reality environment. When a second user is detected within the field of view of a first user, the second user may be identified and virtual content (e.g., an augmented rendering) for the second user may be obtained. The virtual content obtained may differ based on one or more subscriptions for the first user and/or permissions associated with the virtual content of the second user. The virtual content obtained may be rendered and appear superimposed over or in conjunction with a view of the second in the augmented reality environment.
Incorporating risk-based decision in standard authentication and authorization systems
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.
Mechanism and approach to lock a license to a given localization
An approach and mechanism relative to a license that is forced or locked to a particular localization. Forcing a license of a product to be localized may be effected with an attribute specifying the locale or language of a particular region, area, or country. The lock-to-locale region or area may be set and thus force a use of localization settings, lexicon files and resources of the particular region, area or country. A hash or code may be developed and embedded as a value of an attribute on the lock-to-locale feature. The hash or code on the files installed may be validated by matching it with the hash or code securely stored within the license file to ensure that the localization files for the region or area have not been tampered with or changed.
PREVENTING DIGITAL FORGERY
An indication is received to export a file from a host having an authentication device. A memory buffer is allocated for a signature region, a header region, and a content region. A location stamp and a time stamp are calculated for content of the file. The location and time stamps are copied to the header region. An authentication signature is generated using a private key associated with the authentication device. The authentication signature is based on the header and content regions, which include the copied location stamp and timestamp, and content of the file. The authentication signature is copied to the signature region. The memory buffer is written to a new file, the new file being a signed version of the file and including the signature region having the authentication signature, the header region having the location and time stamps, and the content region having the content of the file.
SYSTEMS AND METHODS FOR GENERATING AND FACILITATING ACCESS TO A PERSONALIZED AUGMENTED RENDERING OF A USER
Systems and methods for generating and facilitating access to a personalized augmented rendering of a user to be presented in an augmented reality environment are discussed herein. The augmented rendering of a user may be personalized by the user to comprise a desired representation of the user in an augmented reality environment. When a second user is detected within the field of view of a first user, the second user may be identified and virtual content (e.g., an augmented rendering) for the second user may be obtained. The virtual content obtained may differ based on one or more subscriptions for the first user and/or permissions associated with the virtual content of the second user. The virtual content obtained may be rendered and appear superimposed over or in conjunction with a view of the second in the augmented reality environment.
PROGRESSIVE ACCESS TO DATA AND DEVICE FUNCTIONALITY
A communal computing device such as an interactive digital whiteboard can provide progressively more access to functionality and data on the device based on a level of certainty in the identity of a user. If a user is identified based on one or more low-fidelity identification signals such as an image of the user or a device identifier, the communal computing device may provide a first level of functionality that is limited. If the user requests greater access, the communal computing device can request that a trusted cloud-based provider authenticate the user by way of a personal device, such as a smartphone. The authentication may be a password or high-fidelity biometric identification. The cloud-based provider communicates successful authentication to the communal computing device and it, in turn, provides the user access to higher, second level of functionality.
CONTENT MODIFICATION USING DEVICE-MOBILE GEO-FENCES
A computer-implemented method includes determining that content is objectionable to an individual or to a cohort of individuals; establishing, at a device, a geo-fenced area around the device, wherein the geo-fenced area is selective of the individual or the cohort of individuals; detecting and identifying a person entering the geo-fenced area; determining that the person entering the geo-fenced area corresponds to the individual or cohort of individuals to whom the content is objectionable; and responsive to determining that the person entering the geo-fenced area corresponds to the individual or cohort of individuals to whom the content is objectionable, triggering an ameliorating action with respect to display of the objectionable content on the device. The method can be implemented by the device or by a cloud (networked system) of computing devices, according to instructions embodied in a computer readable medium.
Systems and methods for generating and facilitating access to a personalized augmented rendering of a user
Systems and methods for generating and facilitating access to a personalized augmented rendering of a user to be presented in an augmented reality environment are discussed herein. The augmented rendering of a user may be personalized by the user to comprise a desired representation of the user in an augmented reality environment. When a second user is detected within the field of view of a first user, the second user may be identified and virtual content (e.g., an augmented rendering) for the second user may be obtained. The virtual content obtained may differ based on one or more subscriptions for the first user and/or permissions associated with the virtual content of the second user. The virtual content obtained may be rendered and appear superimposed over or in conjunction with a view of the second in the augmented reality environment.
CONFIGURATION OF A MEDICAL VISUALISATION SYSTEM
A medical visualization system includes a video processing apparatus and one or more medical visualization devices. The medical visualization devices preferably include endoscopes and/or laryngoscopes. The video processing apparatus is operable to receive image data from the one or more medical visualization devices. The video processing apparatus includes a housing, a processing unit adapted to receive the image data from the one or more medical visualization devices and cause a display to display a live representation of the image data, and memory. The processing unit is connected to the memory and adapted to read and write data from and to the memory.