会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 13. 发明授权
    • Apparatus, method and computer program for developing a behaviour tool to estimate a behaviour of a person
    • US11995527B2
    • 2024-05-28
    • US17988099
    • 2022-11-16
    • Arm Limited
    • Remy PottierMinsheng Lu
    • G06V40/20G06N3/004
    • G06N3/004G06V40/20
    • A computer implemented technique for developing a behaviour tool to estimate a behaviour of a particular person in response to a given situation, comprises maintaining, in a storage device, digital memories and a record of associations between the digital memories, where a given digital memory is generated in response to a given event associated with the particular person and is determined from analysis of multiple items of data associated with the given event, including at least items of personal data derived from signals gathered from a plurality of sensors used to monitor the particular person. Processing circuitry is then employed to analyse the digital memories and the record of associations between the digital memories, in order to generate a digital twin of the particular person comprising one or more personalised cognitive models, each personalised cognitive model being arranged to emulate an associated cognitive skill of the particular person. At least one of the one or more personalised cognitive models forming the digital twin is then output for incorporation within the behaviour tool so as to cause the estimated behaviour of the particular person in response to the given situation to be influenced, at least in part, by model output data generated by the at least one of the one or more personalised cognitive models.
    • 16. 发明申请
    • DATA ACCESS AND OWNERSHIP MANAGEMENT
    • 数据访问和所有权管理
    • US20170054721A1
    • 2017-02-23
    • US14832428
    • 2015-08-21
    • ARM IP LimitedARM Limited
    • Milosch MeriacGeraint LuffWilliam Allen CurtisRemy Pottier
    • H04L29/06H04L29/08
    • H04L63/10H04L63/0421H04L67/02H04L67/10H04W12/02
    • In one example, a method includes obtaining, by a data processing device, first secret data associated with a first user and corresponding to a first location of a remote resource. The method further includes generating, using the first secret data, a first uniform resource locator (URL) usable to obtain the first location, and accessing the first location using the first URL. The method further includes obtaining, in response to transfer of usage rights of the data processing device from the first user to a second user, second secret data associated with the second user and corresponding to a second location of the remote resource. The method further includes generating, using the second secret data, a second URL usable to obtain the second location, and accessing the second location using the second URL. The second location is inaccessible via the first URL. The first location is inaccessible via the second URL.
    • 在一个示例中,方法包括由数据处理设备获得与第一用户相关联并对应于远程资源的第一位置的第一秘密数据。 该方法还包括使用第一秘密数据生成可用于获得第一位置的第一统一资源定位符(URL),以及使用第一URL访问第一位置。 该方法还包括响应于数据处理设备从第一用户到第二用户的使用权限的传送而获得与第二用户相关联并对应于远程资源的第二位置的第二秘密数据。 该方法还包括使用第二秘密数据生成可用于获得第二位置的第二URL,以及使用第二URL访问第二位置。 第二个位置无法通过第一个URL访问。 第一个位置无法通过第二个URL访问。