Patent classifications
G06F9/4451
Dynamic, Personality-Driven User Experience
A dynamic, personality-driven user experience that includes receiving, from a user account, a request to access a system interface for a system; identifying, based on personality indicators for the user account, a user account personality from a plurality of user account personalities, wherein each of the personality indicators is associated with at least one of the plurality of user account personalities; reconfiguring the system interface based on the identified user account personality; and granting, to the user account, access to the reconfigured system interface, including presenting the reconfigured system interface to a user of the user account.
Firmware management
Disclosed are various examples for enforcing firmware profiles. First, it is determined that a device record associated with a client device fails to specify a firmware profile. A firmware profile is then generated for the client device. Subsequently, a command is generated that causes a firmware of the client device to be configured based at least in part on the firmware profile. The firmware profile is then stored in the device record.
SORTING OPTIMIZATION BASED ON USER'S TIME PREFERENCES AND HABITS
System and methods discussed for automatically optimizing application and notification delivery based on user preferences and historical application usage. Applications that a user is likely to want to use at the present time or in the near future are displayed in an organizationally distinct way in an application catalog so they are easy to find and are pre-loaded on an application delivery server so they are available with minimal system lag caused by application loading processes. Application notifications are also optimized such that notifications that are likely to be relevant to users at the current time are identified and presented to them in an organizationally distinct way.
Data aggregation with self-configuring drivers
A data aggregation implementation includes self-configuring drivers. From the viewpoint of a Network Operation Center (NOC), a plurality of heterogenous content sources provide content that may be of a variety of different types and formats. All of this content must be ingested and stored for retrieval and reporting, analysis, and/or presentation despite many differences in their collection, format, transmission, and quality. In some embodiments, the NOC includes or cooperates with one or more servers to, among other functions, receive content from content sources, request object reflection by the driver of each content source, receive driver attributes in response, and map the metadata of the content for each content source to a universal schema, thereby self-configuring the driver.
Maintenance of and caching of suspended virtual computers in a pool of suspended virtual computers
Described is a computer system for providing virtual computers. The computer system includes a pool facility for storing a pool of suspended virtual computers based on at least one virtual computer template. The computer system includes a provision manager for ensuring that a series of system logon requests results in the user being provided with a series of virtual computers that reflect applied updates. The provision manager includes an update facility, a resume facility and a customization facility. The update facility regularly applies updates to the virtual computer template to ensure that each virtual computer reflects the updates. The resume facility resumes suspended virtual computers provided by the pool facility. The customization facility customizes each virtual computer for the particular user after the virtual computer is resumed from the pool of suspended virtual computers, the customization including providing the resumed virtual computer with a user data layer.
Frame setup methods for digital picture frames
A picture frame and methods of setup, gifting, and/or use. Network connection allows digital frames to be set up remotely by a first user for a second user. The first user can upload photos from electronic devices or from photo collections of community members before the second user receives the frame device. The frame is thus ready for display upon powering on by the second user. An integrated camera is used to automatically determine an identity of a frame viewer and can capture gesture-based feedback. The displayed photos are automatically shown and/or changed according to the detected viewers. The photos can be filtered and cropped at the receiver side. Clustering photos by content is used to improve display and to respond to photo viewer desires.
Systems and methods for controlling third-party access of a protected data resource
A computer-implemented method is disclosed. The method includes: obtaining an access token associated with a first application, the access token including historical operations data identifying operations previously performed by the first application in accessing a user account at a protected data resource; receiving a first request for the first application to perform a first access operation in connection with the user account using the access token; determining that the first access operation is not permitted based on the historical operations data; and in response to determining that the first access operation is not permitted: modifying the first request to obtain a second request for the first application to perform a second access operation using the access token such that a totality of one or more historical operations and the second access operation comply with access permissions for the first application to access the user account; and transmitting the second request to a server associated with the protected data resource.
Systems and methods for automatically assigning voice communication channels
Systems and methods for assigning voice communication channels used by a crew of employees using communication devices are disclosed. Exemplary implementations may: electronically store information, wherein the information represents associations of individual voice communication channels with one or more communication groups; receive user input that identifies employees, automatically determine sets of communication channel assignments per communication device, between communication channels and subsets of communication groups; configure communication devices according to the determined assignments; and facilitate packet-based communication, using the communication channels, between the communication devices.
SYSTEM AND METHOD FOR INSTALLING A PERSONALIZED APPLICATION ON A MOBILE DEVICE
Disclosed herein are systems and methods for installing a personalized application on a mobile device. In one aspect, an exemplary method comprises, identifying an application distribution source by analyzing settings of an operating system of the mobile device that were changed as a result of obtaining an application from the application distribution source, selecting resources for the application that correspond to the identified application distribution source when a resource database from which the selection is being performed contains at least one resource corresponding to the identified application distribution source, creating the personalized application by reconfiguring the application obtained from the application distribution source based on the selected resources, and installing, on the mobile device, the created personalized application.
IDENTITY PROVIDER SELECTION FOR IDENTITY ATTRIBUTE SHARING PROCESS
Methods of selecting an identity provider using an identity attribute sharing system may include accessing, by a user device, a page of a relying party. The methods may include receiving, by the user device, a selection to utilize an identity network to share a number of identity attributes with the relying party. The methods may include displaying, by the user device, a plurality of identity providers enrolled for use with the identity attribute sharing system. The methods may include receiving, by the user device, a selection of one of the plurality of identity providers. The methods may include providing access to a page of a selected identity provider.