SECURING PHYSICAL ACCESS TO FILE CONTENTS

    公开(公告)号:US20210232673A1

    公开(公告)日:2021-07-29

    申请号:US16774262

    申请日:2020-01-28

    Abstract: A computing system may perform a method that involves receiving an input indicating at least one person, other than a user of a computing device, is proximate to the computing device, determining that the person is within a threshold distance of the computing device based on the received input, and modifying an output of the computing device in response to determining that the person is within the threshold distance from the computing device, so as to inhibit the person from receiving content from the computing device.

    Server for detecting a proxy device in a communications path and related methods

    公开(公告)号:US11005821B2

    公开(公告)日:2021-05-11

    申请号:US16242613

    申请日:2019-01-08

    Abstract: A server for detecting a proxy device in a communications path may include a processor and a memory associated therewith. The processor may obtain an encrypted first portion of an encryption key from the client device. The encryption key may be based upon user-input credentials for a given user. The processor may also communicate an encrypted second portion of the encryption key to the client device based upon determining that the encrypted first portion matches a corresponding first portion of the encryption key indicative of an absence of the proxy device in the communications path. The processor may also detect a loss in connectivity between the server and the client device in response to the client device determining that the decrypted second portion of the encryption key does not match a corresponding second portion of the encryption key indicative of a proxy device in the communications path.

    Secure file modification with supervision

    公开(公告)号:US11683166B2

    公开(公告)日:2023-06-20

    申请号:US16943188

    申请日:2020-07-30

    Abstract: In some embodiments, a method may be performed by a computing device that involves displaying an identifier indicative of a file, the display of the identifier being readable by a second device, receiving first data from the second device in response to the identifier being read by the second device, and enabling performance of at least one action with respect to the file with use of the first data. In some embodiments, the method may further involve receiving a first encryption fragment associated with the file, receiving, from the second device, a second encryption fragment associated with the file, reconstructing, using at least the first encryption fragment and the second encryption fragment, an encryption key enabling viewing of the file, and viewing the file using the encryption key.

    APPLICATION SECURITY THREAT AWARENESS

    公开(公告)号:US20220217174A1

    公开(公告)日:2022-07-07

    申请号:US17142743

    申请日:2021-01-06

    Abstract: A method for providing a visual indication of the security threat awareness level is disclosed. Such a visual indication helps improve the security of a device or an enterprise by giving a user an indication of the security risks associated with currently open and active applications. In turn, the user can use the visual indication as a cue to take mitigating actions to reduce the security risk, such as by using the application more carefully or by exiting the application. Each application is assigned a security score and the system determines the security threat awareness level based on the security score(s) of the open and active applications.

    FILE TRANSFER CONTROL SYSTEMS AND METHODS

    公开(公告)号:US20210258367A1

    公开(公告)日:2021-08-19

    申请号:US17245152

    申请日:2021-04-30

    Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.

    RECOMMENDING FILES FOR FILE SHARING SYSTEM

    公开(公告)号:US20210232542A1

    公开(公告)日:2021-07-29

    申请号:US16774448

    申请日:2020-01-28

    Abstract: A computing system may perform a method that involves receiving, from a first computing device, a request for a file, where the request identifies at least one user who has access to the file and includes information indicative of the file. The method further includes identifying, based at least in part on the received request, the file within a repository of files, sending, to a second computing device, a first indication of the request to access the file, receiving, from the second computing device, a second indication that the file is to be made accessible via the first computing device, and causing the file to be transferred from the repository to the first computing device.

    File transfer control systems and methods

    公开(公告)号:US11044300B2

    公开(公告)日:2021-06-22

    申请号:US16658298

    申请日:2019-10-21

    Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.

    FILE TRANSFER CONTROL SYSTEMS AND METHODS

    公开(公告)号:US20210120071A1

    公开(公告)日:2021-04-22

    申请号:US16658298

    申请日:2019-10-21

    Abstract: Disclosed is a computing system capable of performing a method that involves determining that a first user is authorized to use each of a first device and a second device to access the computing system. The computing system may receive, from the first device, a file transfer request that identifies a first file, and may determine, based at least in part on the file transfer request, that the first file is to be transferred between the computing system and the second device. In response to the file transfer request and based at least in part on the first user being authorized to use each of the first and second devices to access the computing system, the computing system may cause the first file to be transferred between the computing system and the second device.

    ENHANCING EMPLOYEE ENGAGEMENT USING INTELLIGENT WORKSPACES

    公开(公告)号:US20200334698A1

    公开(公告)日:2020-10-22

    申请号:US16387055

    申请日:2019-04-17

    Abstract: A machine learning system may monitor usage of network or hosted resources by users or employees, and may dynamically generate short or “micro” surveys for immediate presentation. These surveys may be aggregated and analyzed by the machine learning system, reducing delays of responses. As a result, engagement may be measured in real-time or near real-time, actionable insights generated, and responsive actions taken. The machine learning system may monitor various interactions of users or employees with a virtual or hosted environment or workspace, including connections to virtual machines, remote desktop applications, SaaS applications, web applications, or other such entities, as well as environmental characteristics such as network location and/or quality.

Patent Agency Ranking