Recommending files for file sharing system

    公开(公告)号:US11334529B2

    公开(公告)日:2022-05-17

    申请号:US16774448

    申请日:2020-01-28

    Abstract: A computing system may perform a method that involves receiving, from a first computing device, a request for a file, where the request identifies at least one user who has access to the file and includes information indicative of the file. The method further includes identifying, based at least in part on the received request, the file within a repository of files, sending, to a second computing device, a first indication of the request to access the file, receiving, from the second computing device, a second indication that the file is to be made accessible via the first computing device, and causing the file to be transferred from the repository to the first computing device.

    SECURE FILE MODIFICATION WITH SUPERVISION

    公开(公告)号:US20210399886A1

    公开(公告)日:2021-12-23

    申请号:US16943188

    申请日:2020-07-30

    Abstract: In some embodiments, a method may be performed by a computing device that involves displaying an identifier indicative of a file, the display of the identifier being readable by a second device, receiving first data from the second device in response to the identifier being read by the second device, and enabling performance of at least one action with respect to the file with use of the first data. In some embodiments, the method may further involve receiving a first encryption fragment associated with the file, receiving, from the second device, a second encryption fragment associated with the file, reconstructing, using at least the first encryption fragment and the second encryption fragment, an encryption key enabling viewing of the file, and viewing the file using the encryption key.

    Application security threat awareness

    公开(公告)号:US11595428B2

    公开(公告)日:2023-02-28

    申请号:US17142743

    申请日:2021-01-06

    Abstract: A method for providing a visual indication of the security threat awareness level is disclosed. Such a visual indication helps improve the security of a device or an enterprise by giving a user an indication of the security risks associated with currently open and active applications. In turn, the user can use the visual indication as a cue to take mitigating actions to reduce the security risk, such as by using the application more carefully or by exiting the application. Each application is assigned a security score and the system determines the security threat awareness level based on the security score(s) of the open and active applications.

    Enhancing employee engagement using intelligent workspaces

    公开(公告)号:US11386441B2

    公开(公告)日:2022-07-12

    申请号:US16387055

    申请日:2019-04-17

    Abstract: A machine learning system may monitor usage of network or hosted resources by users or employees, and may dynamically generate short or “micro” surveys for immediate presentation. These surveys may be aggregated and analyzed by the machine learning system, reducing delays of responses. As a result, engagement may be measured in real-time or near real-time, actionable insights generated, and responsive actions taken. The machine learning system may monitor various interactions of users or employees with a virtual or hosted environment or workspace, including connections to virtual machines, remote desktop applications, SaaS applications, web applications, or other such entities, as well as environmental characteristics such as network location and/or quality.

    Unified file storage system
    5.
    发明授权

    公开(公告)号:US11360943B2

    公开(公告)日:2022-06-14

    申请号:US16892539

    申请日:2020-06-04

    Abstract: A computing system may store a first file in a system repository that is to be synchronized with at least a first repository associated with a first client device and a second repository associated with a second client device. The computing system may determine that the first repository is to receive a downloaded copy of at least a portion of the first file, and may cause a copy of the at least a portion of the first file to be downloaded from the system repository to the first repository. Based at least in part on the computing system determining that the first repository is to receive the downloaded copy, an identifier of the at least a portion of first file may be stored in the second repository without storing a copy of the at least a portion of the first file in the second repository.

    Selecting a mode of delivery to provide access to a file systems and methods

    公开(公告)号:US11349904B2

    公开(公告)日:2022-05-31

    申请号:US16374303

    申请日:2019-04-03

    Abstract: Described embodiments provide systems and methods for selecting between modes for delivering or providing access to a file. A server can be configured to deliver the file via a plurality of modes of delivery including. A first mode of delivery can include downloading the file and a second mode of delivery can include delivering the file via a virtualized stream. The server can receive a request and initiate downloading of the file for a length of time. The server can identify an amount of available bandwidth and size of the file and determine a first time for the first mode of delivery. The first time can be compared to a second time to deliver the file via the second mode of delivery. The server can select between the first mode of delivery and the second mode of delivery and provide the file via the selected mode of delivery.

    Selecting a mode of delivery to provide access to a file systems and methods

    公开(公告)号:US12225071B2

    公开(公告)日:2025-02-11

    申请号:US17747558

    申请日:2022-05-18

    Abstract: Described embodiments provide systems and methods for selecting between modes for delivering or providing access to a file. A server can be configured to deliver the file via a plurality of modes of delivery including. A first mode of delivery can include downloading the file and a second mode of delivery can include delivering the file via a virtualized stream. The server can receive a request and initiate downloading of the file for a length of time. The server can identify an amount of available bandwidth and size of the file and determine a first time for the first mode of delivery. The first time can be compared to a second time to deliver the file via the second mode of delivery. The server can select between the first mode of delivery and the second mode of delivery and provide the file via the selected mode of delivery.

    Extended Reality Authentication
    10.
    发明申请

    公开(公告)号:US20220271934A1

    公开(公告)日:2022-08-25

    申请号:US17662711

    申请日:2022-05-10

    Abstract: Methods and systems for secure authentication in an extended reality (XR) environment are described herein. An XR environment may be output by a computing device and for display on a device configured to be worn by a user. A first plurality of images may be determined via the XR environment. The first plurality of images may be determined based on a user looking at a plurality of objects, real or virtual, in the XR environment. The first plurality of images may be sent to a server, and the server may return a second plurality of images. A public key and private key may be determined based on different portions of each of the second plurality of images. The public key may be sent to the server to register and/or authenticate subsequent communications between the computing device and the server.

Patent Agency Ranking