Abstract:
Implementations generally relate to face template balancing. In some implementations, a method includes generating face templates corresponding to respective images. The method also includes matching the images to a user based on the face templates. The method also includes receiving a determination that one or more matched images are mismatched images. The method also includes flagging one or more face templates corresponding to the one or more mismatched images as negative face templates.
Abstract:
Data access lockdown is described, including receiving a request from a first user to disable access to all data that are access-controlled by the first user based on at least one setting. The data are shared with at least one other user. In response to the request, modifying, without further action by the first user, the at least one setting by replacing a current value indicative of at least some of the data being shared, with a lockdown value indicative of disablement of access to all the data access-controlled by the first user, so as to prevent the at least one other user from accessing any of the data.
Abstract:
Various aspects of the subject technology relate to systems, methods, and machine-readable media for providing personalized services using a client-side user model. A client device is to transmit a request for a service to a server. The server is to receive a request for a personalized service for a user, transmit, to a data server, a request for user data for the user to be used to personalize the service receive, from the data server, a notification that the user data is stored on the client device in response to transmitting the request for the user data, and provide personalization instructions and the service to the client device. The client device is further to receive the requested service and the personalization instructions from the server, personalize the service using the personalization instructions and the user model stored on the client device, and provide the personalized service to a user.
Abstract:
Example implementations described herein are directed to a trust tree that allows third party applications to operate on sensitive user data within the confines of a protected environment. The environment storing the sensitive user data prevents the third party application from receiving sensitive user data through use of an overlay, while preserving the function of the third party application. This permits the value of the application to be provided to a user without the risk of the application violating the user's privacy.
Abstract:
Implementations generally relate to face template balancing. In some implementations, a method includes generating face templates corresponding to respective images. The method also includes matching the images to a user based on the face templates. The method also includes receiving a determination that one or more matched images are mismatched images. The method also includes flagging one or more face templates corresponding to the one or more mismatched images as negative face templates.
Abstract:
Aspects of the present disclosure relate to protecting the privacy of a user of a dispatching service for driverless vehicles. For example, a request for a vehicle identifying user information is received. A client computing device may be identified based on the user information. In response to the request, a driverless vehicle may be dispatched to the location of the client device. Signaling information may be generated based on a set of rules including a first rule that the signaling information does not identify, indirectly or directly, the user as well as a second rule that the signaling information does not identify, indirectly or directly, the user information. The location of the client computing device and the signaling information may be sent to the driverless vehicle for display. In addition, the signaling information may also be sent to the client computing device for display.
Abstract:
Systems and methods for providing authorization of user-generated content are described, including a computer-implemented method for providing content by a first user is provided, including receiving, by one or more computing devices, content from the first user, analyzing context data associated with the content received from the first user, providing the content received from the first user to an authorizer based on a result of the analyzing the context data associated with the content, and providing the content of the first user to a second user in response to receiving an authorization from the authorizer.
Abstract:
A computer-implemented method, including identifying user subscriptions that meet at least one criterion of a plurality of criteria for detecting subscriptions that are no longer active, classifying the user subscriptions into a first group and a second group, where user subscriptions in the first group have at least one context factor associated with the at least one criterion, matching the user subscriptions of the second group with data of unavailable users to produce a third group of user subscriptions, where the user subscriptions of the third group are successfully matched with some of the data of unavailable users.
Abstract:
Systems and methods for attribute-based user data visualizations are described, including determining that an event is associated with a category, the event is one of a plurality of events that are associated with a user using one or more products; clustering the event with a group of events that are associated with the category; identifying at least a portion of the group of events and at least a portion of another group of events of another category, based on one or more time periods; and providing the at least the portion of the group of events and the at least the portion of the another group of events of the another category for visual presentation.
Abstract:
User content access management and control are described, including determining, based on a user-defined rule, that a triggering event has occurred, wherein the user-defined rule is associated with an account that belongs to the user, and the user-defined rule comprises an action to be performed based on a triggering event; and performing the action based on the triggering event, wherein the action affects access to the account.