18121394. TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER simplified abstract (Google LLC)
TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER
Organization Name
Inventor(s)
Matthew Sharifi of Kilchberg (CH)
TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER - A simplified explanation of the abstract
This abstract first appeared for US patent application 18121394 titled 'TRANSFERRING ACTIONS FROM A SHARED DEVICE TO A PERSONAL DEVICE ASSOCIATED WITH AN ACCOUNT OF A USER
The patent application relates to transferring actions from a shared device to a personal device associated with a user's account. It involves determining sensitive information, identifying co-present users, and transferring actions accordingly.
- Determining requests related to sensitive information
- Identifying co-present users with the shared device
- Transferring sensitive requests to the user's personal device
- Recognizing when a user is no longer co-present with the shared device
- Transferring actions to the user's personal device
Potential Applications: - Secure data transfer between devices - Enhanced privacy protection for sensitive information - Streamlining user experience across devices
Problems Solved: - Ensuring data security and privacy - Seamless transition of actions between shared and personal devices
Benefits: - Improved data protection - Enhanced user convenience - Streamlined workflow across devices
Commercial Applications: Title: Secure Data Transfer Technology for Personal Devices This technology can be utilized in industries such as finance, healthcare, and government where data security and privacy are paramount. It can also be integrated into consumer electronics for enhanced user experience.
Questions about the Technology: 1. How does this technology ensure the secure transfer of sensitive information between devices? 2. What measures are in place to protect user privacy during the transfer process?
Frequently Updated Research: Stay updated on advancements in data encryption and secure data transfer protocols to enhance the effectiveness of this technology.
Original Abstract Submitted
Implementations relate to transferring actions from a shared device to a personal device that is associated with an account of a user. Some implementations relate to determining that a request is associated with sensitive information, determining that one or more other users are co-present with the shared device, and transferring the request that is related to sensitive information to a personal device of the user. Some implementations relate determining that a user is no longer co-present with a shared device that is currently performing one or more actions and transferring one or more of the actions to a personal device that is associated with an account of the user.