-
1.
公开(公告)号:US10754714B1
公开(公告)日:2020-08-25
申请号:US16400338
申请日:2019-05-01
Applicant: BlackBerry Limited
Inventor: Neil Patrick Adams , Edward Snow Willis , David Brian Seel , Melanie Arlene Barker , Andrew Kugler , David Noel Vanden Heuvel , Andrew Frank Young
Abstract: Methods and devices are provided relating to taking an action in response to determining that a person who is present in the vicinity of the device, such as a smart speaker, is not authorized to be present. In an aspect, the electronic device receives the notification and a topic identifier associated with the notification. Information identifying persons located in the vicinity of the electronic device may be received. The device may then receive and/or determine information identifying at least one person located within the vicinity who is not authorized, based on the topic identifier, to be present in the vicinity when the notification is to be outputted. The device generates an output signal indicating receipt of the notification and that there is at least one person present in the vicinity who is not authorized to be present when the notification is to be outputted.
-
公开(公告)号:US10944773B2
公开(公告)日:2021-03-09
申请号:US16210596
申请日:2018-12-05
Applicant: BlackBerry Limited
Inventor: Paul Wilson LeMarquand , Kristian Neil Spriggs , David Brian Seel
Abstract: A method for monitoring network activity includes initiating a training phase by a machine learning (ML) server. Data associated with normal network traffic through the ML server during the training phase is collected. A classification model is generated based on the collected data. The ML server switches the training phase to an active phase. An outbound request is received during the active phase. Whether the outbound request is an anomalous request is determined based on the classification model.
-
公开(公告)号:US10277572B2
公开(公告)日:2019-04-30
申请号:US15096677
申请日:2016-04-12
Applicant: BlackBerry Limited
Inventor: Mendel Elliot Spencer , Kirk Douglas Smith , David Brian Seel , Robert Lorne Bowerman , Aleksandar Susnjar , Calin Marius Bozsitz
Abstract: Systems, methods, and software can be used to share content. In some aspect, an enterprise mobility management (EMM) server receives a command for provisioning a user for an enterprise service at an identity provider (IDP). The EMM server sends a user provisioning request to the IDP. The user provisioning request includes a user identity attribute and a user entitlement attribute, the user identity attribute identifies the user, and the user entitlement attribute indicates an access level associated with the user for the enterprise service. The EMM server receives a user provisioning response from the IDP. The user provisioning response indicates that the user is provisioned at the IDP for the enterprise service.
-
-