MALICIOUS OBJECT DETECTION IN 3D PRINTER DEVICE MANAGEMENT

    公开(公告)号:US20220011743A1

    公开(公告)日:2022-01-13

    申请号:US17012248

    申请日:2020-09-04

    Applicant: VMWARE, INC.

    Abstract: Systems and methods for 3D printer management can allow or reject printing of an object based on a model that is trained with machine learning. In one example, the model classifies the object according to object type. The object type can be compared against a list to determine whether to block the object from printing. The object can also be compared to previously printed objects. The object can be blocked from printing if a combination of the object and a previously printed object amounts to a threshold amount of a blacklisted item. The lists can be specific to users, such as an organizational group to which the user belongs. A print server can apply the model prior to forwarding the object to a 3D printer for printing. Both the models and the lists can evolve based on machine learning, such as based on which print decisions receive override from administrators.

    AUGMENTED REALITY BASED IMAGE PROTECTION IN ENTERPRISE SETTINGS

    公开(公告)号:US20230022133A1

    公开(公告)日:2023-01-26

    申请号:US17469931

    申请日:2021-09-09

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples for augmented reality based image protection in enterprise settings. In one example, a managed camera application can generate an artificial reality based camera user interface using image data from a field of view of a camera. An indoor position can be identified using global positioning system (GPS) and indoor positioning data. A sector of the field of view can be identified as a protected image area that depicts a protected or confidential object, and the user interface can be updated to include an AR user interface element that is generated relative to the protected image area that is identified.

    ATTACHMENT AND EMBEDDED OBJECT POSITIONING VALIDATION

    公开(公告)号:US20230019474A1

    公开(公告)日:2023-01-19

    申请号:US17458633

    申请日:2021-08-27

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various approaches for validating a relevance or an accuracy associated with an item being attached to a message or inserted inline with the text of the message or other type of document. An addition of the item (e.g., attachment, hyperlink, embedded image, etc.) to the message being generated by a sender can be detected. Message keywords associated with the message content and item keywords associated with the item content can be identified following an analysis of the message content and item content. The message keywords and item keywords can be compared to determine a likelihood of a mismatch between the item and the message. Upon determining a potential mismatch and prior to the message being sent to a recipient, a notification identifying the likelihood of the mismatch is presented to the sender.

    EMBEDDING CONTENT IN AUDIO CONTENT THROUGH A VOICE ASSISTANT

    公开(公告)号:US20210344666A1

    公开(公告)日:2021-11-04

    申请号:US16903412

    申请日:2020-06-17

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user can use a client device, such as a smartphone, to initiate an authentication flow. A passphrase is provided to the client device can captured by the client device and a voice assistant device. Audio captured by the client device and voice assistant device can be sent to an assistant connection service. The passphrase and an audio signature calculated from the audio can be validated. An association between the user account and the voice assistant device can then be created.

    VOICE SKILL SESSION LIFETIME MANAGEMENT

    公开(公告)号:US20210211422A1

    公开(公告)日:2021-07-08

    申请号:US16801197

    申请日:2020-02-26

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various aspects of voice skill session lifetime management. In some examples, a session extension request is received. The session extension request extends a voice skill session of a voice-activated device. A personal client device is identified based on the session extension request. A command to emit an ultrasonic pulse is transmitted to the personal client device.

    DATA LEAK PREVENTION USING USER AND DEVICE CONTEXTS

    公开(公告)号:US20210209710A1

    公开(公告)日:2021-07-08

    申请号:US16794265

    申请日:2020-02-19

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples for audio data leak prevention using user and device contexts. In some examples, a voice assistant device can be connected to a remote service that provides enterprise data to be audibly emitted by the voice assistant device. In response to a request for the enterprise data being received from the voice assistant device, an audio signal can be generated that audibly broadcasts the enterprise data. The audio signal can be generated to audibly redact at least a portion of the enterprise data based at least in part on a mode of operation of the voice assistant device. The voice assistant device can be directed to emit the enterprise data through a playback of the audio signal.

    SYSTEMS AND METHODS FOR GRANULAR LOCATION BASED DATA SECURITY

    公开(公告)号:US20240232814A1

    公开(公告)日:2024-07-11

    申请号:US18118752

    申请日:2023-03-08

    Applicant: VMWARE, INC.

    CPC classification number: G06Q10/1095 H04W4/33

    Abstract: Disclosed are various embodiments of systems and methods of Granular location-based data security. Various embodiments can be configured to at least identify a map having a plurality of regions, each region of the plurality of regions corresponds to a real-world location and one of a plurality of security indicators. Next, various embodiments can receive a signal that indicates that a user has entered a first real-world location and then, based on the signal, determine a region of the plurality of regions. Next, various embodiments can receive a document access request to access a document. The various embodiments can then determine that the client device is not permitted to access the document while located in the region. Then various embodiments can send, to the client device, a response that directs the client device to perform an action that inhibits the client device from accessing the document.

    PROXIMITY-BASED CONTENT VISIBILITY CONTROL
    20.
    发明公开

    公开(公告)号:US20240232443A1

    公开(公告)日:2024-07-11

    申请号:US18124028

    申请日:2023-03-21

    Applicant: VMWARE, INC.

    CPC classification number: G06F21/84 G06F21/6218 G06F2221/2111

    Abstract: The present disclosure relates to proximity-based content visibility control. A secondary client device can request access to an enterprise resource and receive metadata associated with the enterprise resource. The secondary client device can provide, to a primary client device via a peer-to-peer communication channel, data associated with a proximity of the secondary client device to the primary client device. When the proximity falls below a predefined proximity threshold, the secondary client device can receive an access token from the primary client device via the peer-to-peer communication channel. The secondary client device can render the enterprise resource in a display. The secondary client device can receive a notification from the primary client device that the proximity meets or exceeds the predefined proximity threshold. The secondary client device can obscure at least one sensitive portion of the enterprise resource in the display based at least in part on the metadata.

Patent Agency Ranking