Patent application number | Description | Published |
20130042302 | COGNITIVE PATTERN RECOGNITION FOR COMPUTER-BASED SECURITY ACCESS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request that includes a set of images and an instruction to identify a cognitive pattern in the set of images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20130042303 | COGNITIVE PATTERN RECOGNITION FOR SECURITY ACCESS IN A FLOW OF TASKS - Implementing security access includes receiving a request to perform an activity over a network and administering a cognitive test responsive to the request. The administering includes randomly selecting a set of related images from a database of images, randomly selecting one image that is unrelated to the set of related images, displaying the set of related images along with the image that is unrelated to the set of related images, and prompting a user to identify the image that is unrelated to the set of related images. Implementing the security access also includes processing results of the cognitive test, and executing the activity when it is determined from the processing that the cognitive test has been successfully completed. | 02-14-2013 |
20140184795 | DETECTING RELATIVE CROWD DENSITY VIA CLIENT DEVICES - Detecting crowds is provided. A location is selected in a set of locations a user of a client device wants to go to based on data within a profile associated with the user. A set of data inputs is monitored to determine a number of people currently at the selected location. Then, in response to determining that the number of people currently at the selected location is not greater than a user-defined threshold level of people for the selected location, a mapped route to the selected location is sent to the client device of the user. | 07-03-2014 |
20140189096 | DETECTING RELATIVE CROWD DENSITY VIA CLIENT DEVICES - Detecting crowds is provided. A location is selected in a set of locations a user of a client device wants to go to based on data within a profile associated with the user. A set of data inputs is monitored to determine a number of people currently at the selected location. Then, in response to determining that the number of people currently at the selected location is not greater than a user-defined threshold level of people for the selected location, a mapped route to the selected location is sent to the client device of the user. | 07-03-2014 |
20140253452 | WIRELESS KEYBOARD - Embodiments include a wireless keyboard having a plurality of keys and a plurality of radio frequency identification (RFID) tags, wherein each of the plurality of RFID tags are coupled to one of the plurality of keys. Each of the RFID tags are configured to transmit a signal when one of the plurality of keys coupled to RFID tag is pressed. | 09-11-2014 |
20150026343 | CLOUD-CONNECTABLE MIDDLEWARE APPLIANCE - A computer system and associated method and software where communications between the cloud and a sensor device (for example, a temperature sensor) pass through and are processed by a middleware appliance. The middleware appliance creates data structures called cloud event data objects (cEDOs). A cEDO may include, for example: event data, device data, sensor data, geo key data, payload key data and data value pairs. | 01-22-2015 |
20150039361 | Techniques for Managing Snow Removal Equipment Leveraging Social Media - Techniques that leverage social media to proactively respond to inclement weather conditions such as snow that affect road conditions and, for example, coordinate snow removal from the roads are provided. In one aspect, a method for sharing road condition information is provided. The method includes the following steps. Data is collected from vehicles related to road conditions at various locations. The data is stored in an off-vehicle system. The data is processed to determine what type of maintenance activity is needed based on the road conditions. The maintenance activity and the locations are provided to dispatchers to enable routing of municipal vehicles to the locations to address the road conditions. A system for sharing road conditions is also provided. | 02-05-2015 |
20150206127 | Multiple-node supply chain price determination via mobile phone text message - In a hierarchical multiple-node supply chain, a commodity is sold a first time at a first end of the supply chain and is resold multiple times across the supply chain before being sold a final time at a second end of the supply chain opposite the first end. A user who is a buyer and/or a seller within the supply chain is interacted with by exchanging text messages with a mobile phone device of the user to provide the user with a current price of the commodity for a type of the user within the supply chain, and to receive from the user an actual price of the commodity in a current transaction in which the user was involved. The type of the user includes a node within the supply chain to which the user corresponds. | 07-23-2015 |