Image steganography detection
    51.
    发明授权

    公开(公告)号:US11361075B1

    公开(公告)日:2022-06-14

    申请号:US17351441

    申请日:2021-06-18

    Abstract: In one aspect, an illustrative methodology implementing the disclosed techniques includes, by a computing device, determining that an application process includes use of a first image and a second image, one of the first and second images being generated as part of the application process, and detecting a difference in content of the first image or the second image based on a comparison of the first and second images. The method also includes, by the computing device, revoking access to a file that includes at least one of the first and second images based on the detection of the difference in content of one of the first and second images.

    INVOKING MICROAPP ACTIONS FROM USER APPLICATIONS

    公开(公告)号:US20210392053A1

    公开(公告)日:2021-12-16

    申请号:US16902867

    申请日:2020-06-16

    Abstract: In one disclosed method, a first application accessed by a client device receives an indicator of an action that a second application is configured to take with respect to a third application. The client device accesses a fourth application and presents, based at least in part on the indicator received by the first application, a user interface element for the fourth application. Based at least in part on detecting selection of the user interface element, the client device presents a user interface configured to cause the second application to take the action with respect to the third application in response to a user input. The client device detects the user input to the user interface and causes, based at least in part on the user input, the second application to perform the action with respect to the third application.

    Security device selection based on secure content detection

    公开(公告)号:US11201889B2

    公开(公告)日:2021-12-14

    申请号:US16369648

    申请日:2019-03-29

    Abstract: Methods and systems for performing secure device selection based on sensitive content detection are described herein. The methods and systems may analyze content being accessed via a virtual session established with a first device to determine that at least a portion of the content is sensitive content, determine information indicating one or more security features of the first device and one or more security features of a second device associated with a user of the first device, determine, based on the information, that the second device is more secure than the first device, and, responsive to the determination that the second device is more secure than the first device, transfer the virtual session to the second device or enter a more secure configuration of the first device.

    DYNAMIC RESOURCE ALLOCATION
    54.
    发明申请

    公开(公告)号:US20210357834A1

    公开(公告)日:2021-11-18

    申请号:US16876998

    申请日:2020-05-18

    Abstract: Methods and systems for resource allocation using data from a variety of systems are described herein. A plurality of periods of time for using one or more resources may be identified based on a user request. Data indicative of locations of one or more users over one or more time periods may be received. Such data may be from an application other than a calendar application. Anticipated locations of the one or more users may be determined based on the data received. A resource of the one or more resources may be selected based on a distance between the resource and the anticipated locations of the one or more users. Based on detecting a change to the data, a new resource may be selected.

    Direct linking within applications
    55.
    发明授权

    公开(公告)号:US11157151B1

    公开(公告)日:2021-10-26

    申请号:US16940482

    申请日:2020-07-28

    Abstract: In some embodiments, a method includes: receiving, by a computing device, information indicative of user interface (UI) elements of an application and inputs received by the UI elements; identifying, by the computing device, a feature of the application based on the received information; generating, by the computing device, a direct link to the feature by determining, from the received information, one or more of the UI elements that received inputs to navigate to the feature; and providing, by the computing device, the direct link to one or more users of the application, wherein in response to an input received on the direct link, the direct link interacts with the one or more UI elements to navigate to the application feature.

    CONTEXT-AWARE OBFUSCATION AND UNOBFUSCATION OF SENSITIVE CONTENT

    公开(公告)号:US20210182439A1

    公开(公告)日:2021-06-17

    申请号:US16716669

    申请日:2019-12-17

    Abstract: Techniques are disclosed for context-aware obfuscation and unobfuscation of sensitive content in the display of the sensitive content. An example methodology implementing the techniques includes receiving content for display, the content including metadata indicative of a location of at least one item of sensitive content within the received content, and determining at least one contextual factor. The method also includes, responsive to a determination to obfuscate the item of sensitive content based on the at least one contextual factor, displaying the item of sensitive content in obfuscated form. The method may also include, responsive to a determination to not obfuscate the item of sensitive content based on at least one contextual factor, displaying a non-obfuscated version of the item of sensitive content.

    Proximity and context based stream playback control

    公开(公告)号:US12167050B2

    公开(公告)日:2024-12-10

    申请号:US17744186

    申请日:2022-05-13

    Abstract: A method, a system, and a computer program product for managing multimedia streams of user devices. A reproduction of one or more multimedia streams on a first computing device is determined. A location of a second computing device being positioned in an area enclosed by one or more boundaries in a plurality of boundaries is detected. Each boundary in the plurality of boundaries is associated with a predetermined type of a multimedia stream in one or more multimedia streams. At least one of a pausing and an unpausing of the reproduction of one or more multimedia streams on the first computing device based on the detected location of the second computing device is executed.

    Local model processing and remote verification

    公开(公告)号:US12093356B2

    公开(公告)日:2024-09-17

    申请号:US17171243

    申请日:2021-02-09

    CPC classification number: G06F21/316 G06F11/3438 G06N3/04 G06N20/00

    Abstract: A method may include receiving, by a computing system and from a first device, first data. The first data may be based at least in part on a first output from a first instance of a model processed by the first device. The method may further include receiving, by the computing system and from the first device, second data that was processed by the first instance of the model to produce the first output. The method may also include processing, by the computing system, the second data with at least a portion of a second instance of the model to produce a second output. The method may additionally include determining, by the computing system, third data based at least in part on the second output. Further, the method may include determining, by the computing system, that the third data is consistent with the first data.

    Notifications in Extended Reality Environments

    公开(公告)号:US20230177855A1

    公开(公告)日:2023-06-08

    申请号:US17540516

    申请日:2021-12-02

    Abstract: Methods and systems for providing notifications in an extended reality (XR) environment are described herein. A computing device may provide, to a user and via an XR device, an XR environment. The computing device may detect one or more first locations of one or more display devices. At least one first display device of the one or more display devices may be in a physical environment around the XR device. The computing device may retrieve one or more notifications for display in the XR environment and determine, based on the one or more first locations of the one or more display devices, one or more second locations for the one or more notifications. The computing device may then provide, in the XR environment and at the one or more second locations, the one or more notifications.

Patent Agency Ranking