Optimized Network Selection
    1.
    发明申请

    公开(公告)号:US20200245160A1

    公开(公告)日:2020-07-30

    申请号:US16286728

    申请日:2019-02-27

    Inventor: Xiaolu Chu Dai Li

    Abstract: Methods and systems are described herein for optimized selection of wireless communications networks when multiple wireless communications networks are available to or for selection by a wireless communications device. A wireless communications device may select an optimal network on a per-application and/or per-transmission basis based on one or more policies defined and managed by the device and/or based on dynamic selection of a wireless network based on one or more probed network characteristics (e.g., latency, cost of traffic, data security, etc.). When a state of the device satisfies conditions specified by the policies managed and enforced on the device (e.g., in an enterprise mobility management system), then the wireless network may be selected as defined by the applicable policy. However, when the state of the device does not match an existing policy, then wireless network selection may be based on the dynamic probing of the various networks to determine a preferred wireless network.

    POLICY BASED LOCATION PROTECTION SERVICE
    2.
    发明申请

    公开(公告)号:US20200213832A1

    公开(公告)日:2020-07-02

    申请号:US16816832

    申请日:2020-03-12

    Inventor: Xiaolu Chu Dai Li

    Abstract: Systems and methods for providing privacy protection with regard to location data of an electronic device. The methods comprise: receiving a request to access the location data of the electronic device; determining a privacy protection level associated with the electronic device based on condition related information of the electronic device; blocking access to the location data of the electronic device by the software application based on the privacy protection level; modifying the location data to generate remapped location data of the electronic device based on the privacy protection level associated with the electronic device; and providing the remapped location data to the software application so as to operate the software application without using the location data of electronic device.

    Controlling access to protected resource using a heat map

    公开(公告)号:US11272368B2

    公开(公告)日:2022-03-08

    申请号:US16524319

    申请日:2019-07-29

    Abstract: A technique controls access to a set of protected resources. The technique involves receiving a location signal which identifies a current geolocation of an endpoint device. The technique further involves, based on the current geolocation identified by the location signal, generating a heat map corresponding to a geographic region that includes the current geolocation of the endpoint device, the heat map defining one or more security zones within the geographic region. The technique further involves, selecting a particular security level from multiple security levels based on a security zone of the heat map associated with the current geolocation of the endpoint device, and communicating the selected security level to the endpoint device. The selected security level is associated with security requirements to be satisfied by the endpoint device in order for the endpoint device to access the set of protected resources.

    PREVENTION OF INADVERTENT PASSWORD DISCLOSURE

    公开(公告)号:US20230116273A1

    公开(公告)日:2023-04-13

    申请号:US17529369

    申请日:2021-11-18

    Abstract: In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, determining whether a user interface element having focus is a secure input and, responsive to a determination that the user interface element is a secure input, preventing the focus from changing away from the user interface element. The method also includes, by the computing device, responsive to a determination that the user interface element is a secure input, allowing the focus to change away from the user interface element in response to a determination that an input to the user interface element is complete. The method may further include, by the computing device, responsive to a determination that the user interface element is not a secure input, allowing the focus to be moved to another user interface element.

    TECHNIQUES INVOLVING A SECURITY HEAT MAP

    公开(公告)号:US20210328999A1

    公开(公告)日:2021-10-21

    申请号:US16481533

    申请日:2019-03-29

    Abstract: A technique utilizes a security heat map associated with a geographic region. The technique involves receiving, by a server, current heat scores for one or more endpoint devices located within the geographic region. The technique further involves providing, by the server, for areas within the geographic region, respective aggregate heat scores based on the current heat scores for the one or more endpoint devices. The technique further involves, based on the respective aggregate heat scores for the areas within the geographic region, generating, by the server, a security heat map defining one or more security zones within the geographic region. The technique further involves imposing, by the server, security policies on the one or more endpoint devices based on the security heat map.

    USER INTERFACE FOR REMINDING A USER OF INCOMPLETE TASKS IN INACTIVE APPLICATION WINDOWS

    公开(公告)号:US20230195294A1

    公开(公告)日:2023-06-22

    申请号:US17568258

    申请日:2022-01-04

    CPC classification number: G06F3/04847 G06F3/04817 G06F3/04886 G06F9/451

    Abstract: In accordance with one disclosed method, a determination may be made that a user has provided a first input to a client device to begin taking an action with respect to an application presented in a first window of an operating system while the first window is an active window of the operating system. It may then be determined that a second window has become the active window of the operating system, and that the user has not provided a second input to the client device to complete the action with respect to the application. Based at least in part on the second window having become the active window and the user not having provided the second input, the client device may be caused to present a notification indicative of the action being incomplete.

    Policy based notification protection service in workspace

    公开(公告)号:US11170126B2

    公开(公告)日:2021-11-09

    申请号:US16238972

    申请日:2019-01-03

    Inventor: Xiaolu Chu Dai Li

    Abstract: Systems and methods described herein provide for management of notifications. A server may receive proximity information indicative of a distance between the client device and a user of the client device, and idle state information of the client device. The server may determine a notification protection level using the proximity information and the idle state information. The server may receive a notification from the at least one notification source. The notification is for rendering on a screen of the client device. The notification manager may manage delivery of the received notification, according to the determined notification protection level.

    Optimized network selection
    9.
    发明授权

    公开(公告)号:US10812995B2

    公开(公告)日:2020-10-20

    申请号:US16286728

    申请日:2019-02-27

    Inventor: Xiaolu Chu Dai Li

    Abstract: Methods and systems are described herein for optimized selection of wireless communications networks when multiple wireless communications networks are available to or for selection by a wireless communications device. A wireless communications device may select an optimal network on a per-application and/or per-transmission basis based on one or more policies defined and managed by the device and/or based on dynamic selection of a wireless network based on one or more probed network characteristics (e.g., latency, cost of traffic, data security, etc.). When a state of the device satisfies conditions specified by the policies managed and enforced on the device (e.g., in an enterprise mobility management system), then the wireless network may be selected as defined by the applicable policy. However, when the state of the device does not match an existing policy, then wireless network selection may be based on the dynamic probing of the various networks to determine a preferred wireless network.

    CONTROLLING ACCESS TO PROTECTED RESOURCE USING A HEAT MAP

    公开(公告)号:US20200314650A1

    公开(公告)日:2020-10-01

    申请号:US16524319

    申请日:2019-07-29

    Abstract: A technique controls access to a set of protected resources. The technique involves receiving a location signal which identifies a current geolocation of an endpoint device. The technique further involves, based on the current geolocation identified by the location signal, generating a heat map corresponding to a geographic region that includes the current geolocation of the endpoint device, the heat map defining one or more security zones within the geographic region. The technique further involves, selecting a particular security level from multiple security levels based on a security zone of the heat map associated with the current geolocation of the endpoint device, and communicating the selected security level to the endpoint device. The selected security level is associated with security requirements to be satisfied by the endpoint device in order for the endpoint device to access the set of protected resources.

Patent Agency Ranking