- Armonk NY, US Thomas Jefferson Sandridge - Tampa FL, US Jeremy R. Fox - Georgetown TX, US Zachary A. Silverstein - Austin TX, US
International Classification:
G06K 9/62 G06N 3/08
Abstract:
One or more computer processors establish a geofence surrounding a display having a plurality of pixels capable of change based on one or more display capabilities. The one or more computer processors monitor for a change in at least one pixel of the plurality of pixels. The one or more computer processors identify a photosensitive user within the established geofence. The one or more computer processors responsive to the at least one pixel change associated with the display, calculate a photosensitivity score utilizing a model trained for one or more photosensitive conditions associated with the photosensitive user. The one or more computer processors adjust the display to show a change on the at least one pixel based on the calculated photosensitivity score.
- Armonk NY, US Thomas Jefferson Sandridge - Tampa FL, US Alan Chung - Hopewell Junction NY, US Jeremy R. Fox - Georgetown TX, US Sarbajit K. Rakshit - Kolkata, IN
A first user input is detected from a client device. The first user input is directed at a video content that includes a set of one or more topics, the first user input is from a viewer of the video content. A set of one or more frames in the video content is analyzed based on the first user input. A first topic in the video content is identified based on the set of frames and based on the viewer. The video content, related to the first topic of the set of topics, is altered based on the set of frames and based on the viewer.
Shopper-Based Commerce Driven Presentation Of Required-But-Missing Product Related Information
- Armonk NY, US Thomas Jefferson Sandridge - Tampa FL, US Jeremy R. Fox - Georgetown TX, US Raghuveer Prasad Nagar - Kota, IN Reji Jose - Bangalore, IN Jagadesh Ramaswamy Hulugundi - Bangalore, IN
International Classification:
G06Q 30/06 G06N 20/00 G06K 9/00 G06T 11/00
Abstract:
In an approach for a shopper-based commerce driven presentation of required-but-missing product related information, a processor detects a user viewing a physical product via a mixed reality device. A processor identifies a preferred environment for the physical product from a personal shopper profile of the user. A processor generates via the mixed reality device a depiction of the preferred environment. A processor determines whether the physical product can be overlaid in the preferred environment. A processor enables the user to purchase a product based on the determination.
- Armonk NY, US Thomas Jefferson Sandridge - Tampa FL, US Alvin Zhang - Somerville MA, US Robert Huntington Grant - Marietta GA, US
International Classification:
H04L 29/06
Abstract:
Embodiments of the present invention provide computer-implemented methods, computer program products and computer systems. Embodiments of the present invention can monitor user activity for one or more user interactions performed while connected to a Virtual Private Network. Embodiments of the present invention can then identify potential risks associated with a user and respective user interactions. Embodiments of the present invention can then, in response to determining a respective user interaction of the one or more interactions is suspicious, generate a real time risk score for the respective user interaction. Embodiments of the present invention can then, in response to the generate real time risk score exceeding a threshold level of risk for the respective user interaction, initiate a secondary authentication protocol.
- Armonk NY, US Sarbajit K. Rakshit - Kolkata, IN Thomas Jefferson Sandridge - Tampa FL, US
International Classification:
H04W 4/30 G06N 3/08 H04W 4/08 H02J 50/40
Abstract:
A method of power control for mobile devices, comprising providing a power management application in a first mobile device of a plurality of mobile devices, and wirelessly sharing power among the plurality of mobile devices according to at least one of the user-selectable power sharing templates. The power management application may include a plurality of user-selectable power sharing templates that define how the plurality of mobile devices will share power between themselves. The power management application may recommend one of the plurality of power sharing templates for activities by a user of the first mobile device.
- Armonk NY, US GIRISH RATNAM - Plano TX, US Thomas Jefferson Sandridge - Tampa FL, US Nicholas Bokun - Stratford NJ, US Jacob Thomas Covell - New York NY, US
International Classification:
H04L 9/32 G06N 20/00
Abstract:
Described are techniques for preserving data security for sensitive information. The techniques including identifying sensitive information in first audio data from a first client device. The techniques further comprise generating second audio data including hashed sensitive information, where the hashed sensitive information comprises an audio clip that replaces the sensitive information and that is based on the sensitive information. The techniques further comprise transmitting the second data including the hashed sensitive information to a second client device. The techniques further comprise receiving third audio data including the hashed sensitive information from the second client device. The techniques further comprise generating fourth audio data by replacing the hashed sensitive information with the sensitive information and transmitting the fourth audio data including the sensitive information to the first client device.
A cognitive augmented reality selection assistant of a personal imaging system provides users with recommendations to best fit their needs in real time through AR overlay of the personal transportation. The personal imaging system allows real time input to be provided, including alterations to the personal transportation or recognition of possible faulty equipment associated with the personal transportation.
- Armonk NY, US Robert Huntington Grant - Marietta GA, US Jacky Lu - Brooklyn NY, US Thomas Jefferson Sandridge - Tampa FL, US
International Classification:
H04L 29/06 H04W 12/12 G06N 20/00
Abstract:
A method can include detecting an activation of a networked device. The method can further include obtaining a hazard score corresponding to a degree of hazard associated with the networked device. The method can further include determining an activation confidence score corresponding to the activation of the networked device. The method can further include determining, based at least in part on the hazard score and the activation confidence score, an adjusted activation confidence score. The method can further include determining that the adjusted activation confidence score exceeds a threshold. The method can further include initiating a deactivation of the networked device in response to the determining that the adjusted confidence score exceeds the threshold.