Data mesh based environmental augmentation
First Claim
Patent Images
1. A system comprising:
- one or more processors; and
memory storing instructions that, when executed by the one or more processors, cause the system to perform operations comprising;
receiving attribute data associated with a plurality of electronic devices, the plurality of electronic devices comprising at least a first electronic device including a location sensor, a second electronic device excluding a location sensor, and a third electronic device excluding a location sensor, the second electronic device associated with a first location, the third electronic device associated with a second location;
identifying a portion of first real-time data produced by the first electronic device and a portion of second real-time data produced by the second electronic device as being indicative of a user identity;
authenticating the user based on an analysis of the portion of the first real-time data and the portion of the second real-time data indicative of a user identity, the authenticating comprising calculating an identity likelihood metric based on the portion of the first real-time data and the portion of the second real-time data, the identity likelihood metric indicating a likelihood of authentication of the user with respect to the first real-time data and the second real-time data;
in response to the authenticating, transmitting secured content for presentation on the second electronic device;
detecting movement of the first electronic device from the first location to the second location; and
in response to the detecting movement of the first electronic device to the second location, automatically transmitting the secured content for presentation on the third electronic device without requiring authentication input from the user on the third electronic device.
1 Assignment
0 Petitions
Accused Products
Abstract
In various example embodiments, a system and method for data mesh-based environmental augmentation are presented. Attribute data associated with a user may be received from a plurality of attribute sources. A portion of the attribute data may include real-time data. A portion of the real-time data indicative of an identity of the user may be identified. The identity of the user may be authenticated with respect to the real-time data by analyzing the identified portion of the real-time data. Based on the authentication of the identity of the user, a user activity being performed by the user may be identified based on the real-time data, and the user activity may be augmented according to a user setting.
-
Citations
22 Claims
-
1. A system comprising:
-
one or more processors; and memory storing instructions that, when executed by the one or more processors, cause the system to perform operations comprising; receiving attribute data associated with a plurality of electronic devices, the plurality of electronic devices comprising at least a first electronic device including a location sensor, a second electronic device excluding a location sensor, and a third electronic device excluding a location sensor, the second electronic device associated with a first location, the third electronic device associated with a second location; identifying a portion of first real-time data produced by the first electronic device and a portion of second real-time data produced by the second electronic device as being indicative of a user identity; authenticating the user based on an analysis of the portion of the first real-time data and the portion of the second real-time data indicative of a user identity, the authenticating comprising calculating an identity likelihood metric based on the portion of the first real-time data and the portion of the second real-time data, the identity likelihood metric indicating a likelihood of authentication of the user with respect to the first real-time data and the second real-time data; in response to the authenticating, transmitting secured content for presentation on the second electronic device; detecting movement of the first electronic device from the first location to the second location; and in response to the detecting movement of the first electronic device to the second location, automatically transmitting the secured content for presentation on the third electronic device without requiring authentication input from the user on the third electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method implemented by at least one processor of a computing device, the method comprising:
-
receiving, by a computing system, attribute data associated with a plurality of electronic devices, the plurality of electronic devices comprising at least a first electronic device including a location sensor, a second electronic device excluding a location sensor, and a third electronic device excluding a location sensor, the second electronic device associated with a first location, the third electronic device associated with a second location; identifying, by the computing system, a portion of first real-time data originating from the first electronic device and a portion of second real-time data originating from the second electronic device as being indicative of a user identity; authenticating, by the computing system, the user based on an analysis the portion of the first real-time data and the portion of the second real-time data indicative of a user identity, the authenticating comprising calculating an identity likelihood metric based on the portion of the first real-time data and the portion of the second real-time data, the identity likelihood metric indicating a likelihood of authentication of the user with respect to the first real-time data and the second real-time data; in response to the authenticating, transmitting secured content for presentation on the second electronic device; detecting a movement of the first electronic device from the first location to the second location; and in response to the detecting movement of the first electronic device to the second location, automatically transmitting the secured content for presentation on the third electronic device without requiring authentication input from the user on the third electronic device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory machine-readable medium storing instructions that, when executed by at least one processor of a computing system, cause the computing system to perform operations comprising:
-
receiving, by a computing system, attribute data associated with a plurality of electronic devices, the plurality of electronic devices comprising at least a first electronic device including a location sensor, a second electronic device excluding a location sensor, and a third electronic device excluding a location sensor, the second electronic device associated with a first location, the third electronic device associated with a second location; identifying, by the computing system, a portion of first real-time data originating from the first electronic device and a portion of second real-time data originating from the second electronic device as being indicative of a user identity; authenticating, by the computing system, the user based on an analysis of the portion of the first real-time data and the portion of the second real-time data indicative of a user identity, the authenticating comprising calculating an identity likelihood metric based on the portion of the first real-time data and the portion of the second real-time data, the identity likelihood metric indicating a likelihood of authentication of the user with respect to the first real-time data and the second real-time data; in response to the authenticating, transmitting secured content for presentation on the second electronic device; detecting a movement of the first electronic device from the first location to the second location; and in response to the detecting movement of the first user device to the second location, automatically transmitting the secured content for presentation on the third electronic device without requiring authentication input from the user on the third electronic device. - View Dependent Claims (22)
-
Specification