Secure Display of Sensitive Content
    91.
    发明公开

    公开(公告)号:US20230214481A1

    公开(公告)日:2023-07-06

    申请号:US17570140

    申请日:2022-01-06

    Abstract: Methods and systems for secure display of sensitive content are described herein. A server may receive, from a first computing device, a request for content. The content may include at least one portion that is marked as sensitive content. The server may determine that the first computing device does not satisfy an authorized device criterion, and send a modified version of the content to the first computing device. The modified version of the content may include the at least one portion that is obfuscated. The server may send an unmodified version of the content to a second computing device that satisfies the authorized device criterion. The second computing device may display the unmodified version of the content at least partially overlaid on top of the modified version of the content being displayed on the first computing device.

    MICROAPP RECOMMENDATIONS FOR NETWORKED APPLICATION FUNCTIONALITY

    公开(公告)号:US20230185864A1

    公开(公告)日:2023-06-15

    申请号:US17643445

    申请日:2021-12-09

    CPC classification number: G06F16/9535 G06F16/9538 G06F16/24578 G06F9/547

    Abstract: A method for generating a microapp recommendation comprises receiving, at a client computing device, microapp metadata that characterizes multiple microapps. The method further comprises using a resource access application executing at the client computing device to launch a networked application that displays a user interface. The method further comprises calculating a composite correlation score for a particular microapp. The composite correlation score quantifies correlation between functionality provided by the user interface of the networked application and functionality provided by the particular microapp. The method further comprises using the composite correlation score to make a determination with respect to whether the particular microapp should be recommended to a user of the client computing device. The method further comprises, in response to determining that the particular microapp should be recommended to the user of the client computing device, displaying a supplemental user interface that provides a recommendation for the particular microapp.

    SYSTEMS AND METHODS TO ANALYZE AUDIO DATA TO IDENTIFY DIFFERENT SPEAKERS

    公开(公告)号:US20230129467A1

    公开(公告)日:2023-04-27

    申请号:US17508212

    申请日:2021-10-22

    Abstract: A computing system may receive data representing dialog between persons, the data representing words spoken by at least first and second speakers, determine an intent of a speaker for a first portion of the data, the intent being indicative of an identity of the first or second speaker for the first portion of the data or another portion of the data different than the first portion, determine a name of the first or second speaker represented in the first portion of the data based at least in part on the determined intent, and output an indication of the determined name so that the indication identifies the first portion of the data or the another portion of the data with the first or second speaker.

    PREVENTING MISDIRECTED PASSWORD ENTRY

    公开(公告)号:US20230123446A1

    公开(公告)日:2023-04-20

    申请号:US17501579

    申请日:2021-10-14

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to detect entry of data into a username entry field of a login form served to a web browser from a website. The at least one processor is further configured to detect a paste operation associated with the login form. The at least one processor is further configured to identify a focus for the paste operation. The at least one processor is further configured to perform a security action in response to the focus not being directed to a field other than a password entry field of the login form. Th security action may include blocking the paste operation, providing a warning, and/or obtaining confirmation for the paste operation.

    Direct linking within applications
    98.
    发明授权

    公开(公告)号:US11556229B2

    公开(公告)日:2023-01-17

    申请号:US17482899

    申请日:2021-09-23

    Abstract: In some embodiments, a method includes: receiving, by a computing device, information indicative of user interface (UI) elements of an application and inputs received by the UI elements; identifying, by the computing device, a feature of the application based on the received information; generating, by the computing device, a direct link to the feature by determining, from the received information, one or more of the UI elements that received inputs to navigate to the feature; and providing, by the computing device, the direct link to one or more users of the application, wherein in response to an input received on the direct link, the direct link interacts with the one or more UI elements to navigate to the application feature.

    REDIRECTION OF ATTACHMENTS BASED ON RISK AND CONTEXT

    公开(公告)号:US20230004638A1

    公开(公告)日:2023-01-05

    申请号:US17363631

    申请日:2021-06-30

    Abstract: A computer system is provided. The computer system includes a memory and at least one processor coupled to the memory and configured to evaluate a risk associated with an email attachment based on application of security policies to properties of the attachment and to the context associated with receipt of the email. The at least one processor is further configured to detect an attempt by a user to open the email attachment. The at least one processor is further configured to prevent the opening of the attachment based on the evaluated risk. The at least one processor is further configured to redirect the attachment to a secure browser, hosted on a remote server, based on the evaluated risk.

    Context-aware obfuscation and unobfuscation of sensitive content

    公开(公告)号:US11544415B2

    公开(公告)日:2023-01-03

    申请号:US16716669

    申请日:2019-12-17

    Abstract: Techniques are disclosed for context-aware obfuscation and unobfuscation of sensitive content in the display of the sensitive content. An example methodology implementing the techniques includes receiving content for display, the content including metadata indicative of a location of at least one item of sensitive content within the received content, and determining at least one contextual factor. The method also includes, responsive to a determination to obfuscate the item of sensitive content based on the at least one contextual factor, displaying the item of sensitive content in obfuscated form. The method may also include, responsive to a determination to not obfuscate the item of sensitive content based on at least one contextual factor, displaying a non-obfuscated version of the item of sensitive content.

Patent Agency Ranking