18121394. TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER simplified abstract (Google LLC)

From WikiPatents
Revision as of 11:17, 19 September 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER

Organization Name

Google LLC

Inventor(s)

Matthew Sharifi of Kilchberg (CH)

Victor Carbune of Zurich (CH)

TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER - A simplified explanation of the abstract

This abstract first appeared for US patent application 18121394 titled 'TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER

The patent application relates to transferring actions from a shared device to a personal device associated with a user's account. It involves determining sensitive information, identifying co-present users, and transferring actions accordingly.

  • Determining requests related to sensitive information
  • Identifying co-present users with the shared device
  • Transferring sensitive requests to the user's personal device
  • Recognizing when a user is no longer co-present with the shared device
  • Transferring actions to the user's personal device

Potential Applications: - Secure data transfer between devices - Enhanced privacy protection for sensitive information - Streamlining user experience across devices

Problems Solved: - Ensuring data security and privacy - Seamless transition of actions between shared and personal devices

Benefits: - Improved data protection - Enhanced user convenience - Streamlined workflow across devices

Commercial Applications: Title: Secure Data Transfer Technology for Personal Devices This technology can be utilized in industries such as finance, healthcare, and government where data security and privacy are paramount. It can also be integrated into consumer electronics for enhanced user experience.

Questions about the Technology: 1. How does this technology ensure the secure transfer of sensitive information between devices? 2. What measures are in place to protect user privacy during the transfer process?

Frequently Updated Research: Stay updated on advancements in data encryption and secure data transfer protocols to enhance the effectiveness of this technology.


Original Abstract Submitted

Implementations relate to transferring actions from a shared device to a personal device that is associated with an account of a user. Some implementations relate to determining that a request is associated with sensitive information, determining that one or more other users are co-present with the shared device, and transferring the request that is related to sensitive information to a personal device of the user. Some implementations relate determining that a user is no longer co-present with a shared device that is currently performing one or more actions and transferring one or more of the actions to a personal device that is associated with an account of the user.