PROTECTING CONTENT ON A DISPLAY DEVICE FROM A FIELD-OF-VIEW OF A PERSON OR DEVICE

    公开(公告)号:US20180300510A1

    公开(公告)日:2018-10-18

    申请号:US15487129

    申请日:2017-04-13

    CPC classification number: G06F21/84 G06F21/577 G06F21/6245

    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.

    Data Cube
    2.
    发明申请

    公开(公告)号:US20220382883A1

    公开(公告)日:2022-12-01

    申请号:US17333066

    申请日:2021-05-28

    Inventor: Yeeling Lam

    Abstract: Concepts and technologies disclosed herein are directed to a data security cube with a key cube. According to one aspect of the concepts and technologies disclosed herein, a system can execute a data security cube application. The application can receive user data associated with a user. The application can create a data cube that includes at least one data layer that, in turn, includes the user data represented in a binary format. The application can create a key cube that includes at least one key layer that, in turn, includes a data type of the user data, an element identifier that identifies a location of the user data within the data cube, and a decryption logic that decrypts the user data in the binary format. The application can store the data cube and the key cube in secure storage component of the system.

    COUNTER INTELLIGENCE BOT
    4.
    发明申请

    公开(公告)号:US20200028874A1

    公开(公告)日:2020-01-23

    申请号:US15828643

    申请日:2017-12-01

    Inventor: Yeeling Lam

    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.

    Counter intelligence bot
    5.
    发明授权

    公开(公告)号:US12041082B2

    公开(公告)日:2024-07-16

    申请号:US18174722

    申请日:2023-02-27

    Inventor: Yeeling Lam

    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.

    COUNTER INTELLIGENCE BOT
    6.
    发明公开

    公开(公告)号:US20230231877A1

    公开(公告)日:2023-07-20

    申请号:US18174722

    申请日:2023-02-27

    Inventor: Yeeling Lam

    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.

    COUNTER INTELLIGENCE BOT
    7.
    发明申请

    公开(公告)号:US20200382550A1

    公开(公告)日:2020-12-03

    申请号:US16995883

    申请日:2020-08-18

    Inventor: Yeeling Lam

    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.

    Counter intelligence bot
    8.
    发明授权

    公开(公告)号:US11616808B2

    公开(公告)日:2023-03-28

    申请号:US16995883

    申请日:2020-08-18

    Inventor: Yeeling Lam

    Abstract: Techniques are provided that facilitate responding to cyberattacks using counter intelligence (CI) bot technology. In one embodiment, a first system is disclosed that comprises a processor and a memory. The memory can store executable instructions that, when executed by the processor, facilitate performance of operations including receiving a request from a second system requesting assistance in association with a cyberattack on the second system, wherein the request comprises information indicating a type of the cyberattack. The operations further comprise selecting a counter intelligence bot configured to respond to the type of cyberattack, and directing the counter intelligence bot to respond to the cyberattack, wherein the directing comprises enabling the counter intelligence bot to respond to the cyberattack by establishing a gateway with the second system and employing the gateway to intercept and respond to traffic associated with the cyberattack on behalf of the second system.

    Protecting content on a display device from a field-of-view of a person or device

    公开(公告)号:US11080434B2

    公开(公告)日:2021-08-03

    申请号:US16794950

    申请日:2020-02-19

    Abstract: A server can receive data about attributes of user devices that includes sensors for capturing information about environments in which the user devices are located. The server can determine various risk profiles using the attributes. The risk profiles can indicate likelihoods of content on the user devices being viewed by persons other than users of the user device. The server can also transmit data indicating a risk profile of the various risk profiles to a user device. The user device can use the risk profile received from the server to identify confidential content displayed on the user device and protect the confidential content.

Patent Agency Ranking