Intelligent creation of customized responses to customer feedback

    公开(公告)号:US12079577B2

    公开(公告)日:2024-09-03

    申请号:US17499617

    申请日:2021-10-12

    Applicant: VMware, Inc.

    Abstract: Systems and methods are described for creating a customized response to user feedback. In an example, a feedback system can receive user feedback about a product. The feedback system can parse the user feedback to extract keywords and assign categories to the keywords. The feedback system can also receive update information related to the product. The feedback system can parse the product update information in a similar manner to extract keywords and assign them to categories. The feedback system can compare the parsed user feedback and the parsed product update information and identify any matches that indicate that the product update addresses something mentioned in the user feedback. The feedback system can create a custom notification that highlights the portion of the product update information that matched to the user feedback.

    PEER-TO-PEER SECURITY STATUS DETECTION
    33.
    发明公开

    公开(公告)号:US20240137358A1

    公开(公告)日:2024-04-25

    申请号:US17969498

    申请日:2022-10-18

    Applicant: VMware, Inc.

    CPC classification number: H04L63/0823 H04L67/141

    Abstract: Disclosed are various approaches for peer-to-peer device security detection. In some examples, a first client device transmits verification data to a second client device. The verification data includes a public key verification certificate of the client device, and a time-based session token generated by the first client device. The first client device receives a preliminary cross-comparison package from the second client device. The preliminary package includes a spoof-check token, and peer device context data of the second client device. The first client device generates a cross-comparison package using the preliminary cross-comparison package and local device context data of the first client device, and transmits the cross-comparison package to a management service for cross-comparison.

    IDENTIFYING ENTERPRISE CONNECTIONS
    34.
    发明公开

    公开(公告)号:US20240020773A1

    公开(公告)日:2024-01-18

    申请号:US17950122

    申请日:2022-09-22

    Applicant: VMWARE, INC.

    CPC classification number: G06Q50/01

    Abstract: Disclosed are various embodiments for identifying a connection to an external user or organization based upon analysis of data sources within an enterprise. User activity within communications applications can be assessed to identify a closest connection to the external user or organization based upon frequency of communication, age of communication, and/or a sentiment analysis.

    PERSONALIZED INFORMATIONAL USER EXPERIENCES USING VISUAL CONTENT

    公开(公告)号:US20230412887A1

    公开(公告)日:2023-12-21

    申请号:US17750337

    申请日:2022-05-21

    Applicant: VMware, Inc.

    CPC classification number: H04N21/4668 H04L51/42 H04L51/226

    Abstract: Disclosed are various examples for to generating personalized user experiences in the form of short-form videos that summarize informational topics that are selected to present to a user according at least one of a user context or a user interest. As the informational topics are identified for a given user, the informational topics can be applied as inputs to a recommendation model that is trained to recommend one or more of the topics to summarize and present to a user in visual form based on at least one of the user context or the user interest. Once a topic is recommended by the recommendation model, a video or other type of visual content can be automatically generated and presented to a user to allow the user to consume the information in the summarized form.

    Securing confidential content in a virtual meeting

    公开(公告)号:US11736454B2

    公开(公告)日:2023-08-22

    申请号:US17327137

    申请日:2021-05-21

    Applicant: VMware, Inc.

    CPC classification number: H04L63/0428 H04L9/14

    Abstract: Systems and methods are described for securing confidential content in a virtual meeting. In an example, a host can create a meeting agenda that identifies attendees and access restrictions for the meeting. A server can generate encryption keys corresponding to different confidentiality levels of content identified in the agenda. The encryption keys can be provided to user devices of the attendees based on the access permissions of the attendees. As the virtual meeting takes place, the server can encrypt confidential portions of the content stream for the meeting using the encryption keys. In an example, the server can also apply a machine learning algorithm to identify any confidential content in the content stream not previously identified. The server can encrypt additional confidential content where appropriate using encryption keys corresponding to the confidentiality level of the content.

    Automated hyperlinks for draft emails

    公开(公告)号:US11669581B2

    公开(公告)日:2023-06-06

    申请号:US17388540

    申请日:2021-07-29

    Applicant: VMware, Inc.

    CPC classification number: G06F16/9558 G06F16/90335 H04L51/08

    Abstract: Examples described herein can identify items from third-party or backend services, obtain relevant information for those items, and automatically populate hyperlinks relevant to those items in a draft email. A regular expressions search can be executed on the text of a draft email. When a match is found, the email client can request, from a server, an object associated with the matching expression. The server can obtain the object, using one or more connectors that provide access to a backend system, and provide it to the email client. The email client can extract a URL from the object and enter the URL into a links table stored on the user device. The email client can pull the URL from the links table and use it to automatically generate a hyperlink of the regular expression within the body of the draft email.

    SMART WORKFLOW ACTION-BASED CHECKLIST

    公开(公告)号:US20230129849A1

    公开(公告)日:2023-04-27

    申请号:US17507466

    申请日:2021-10-21

    Applicant: VMware, Inc.

    Abstract: Systems and methods are described for creating tasks for an action-based checklist. In an example, a checklist system can receive a body of text, such as text from an email, calendar invite, or document. The checklist system can extract words in the text body that correspond to a task description component of stored task templates. Based on the extracted words, the checklist system can identify an applicable task template. The checklist system can parse utterances in the text body and identify an entity value based on example utterances provided in the task template. The checklist system can insert the entity value into placeholders in the task template and generate task from the task template. The checklist system can add the task to a checklist that is provided to a user device.

Patent Agency Ranking