-
公开(公告)号:US20220408217A1
公开(公告)日:2022-12-22
申请号:US17350567
申请日:2021-06-17
发明人: Julie Allen , Fernando Molina Rodriguez , Andi Bridgett Cho , Matthew L. Sommer , Gonzalo Salgueiro , Pascale Delaunay
摘要: Techniques are for provided located-based contextual services to users by automatically creating location-based contextually relevant communication sessions that may take on a variety of forms, including contextual chats and micro-local services that are ephemeral, curated by a location owner and personalized by a user. As a user's context shifts throughout the day (from work to shopping to entertainment, etc.) the presented techniques filter content differently based on what the user may care about at a particular moment when the user is at a particular venue. The automatic creation and deletion of an ephemeral space/channel provides a dynamic application that changes its content or behavior based on a user's location. The user may control the interactivity level based on an adaptive user identifier by which a user's identity may take on different versions depending on location and time of day.
-
公开(公告)号:US20230023723A1
公开(公告)日:2023-01-26
申请号:US17385444
申请日:2021-07-26
发明人: Pascale Delaunay , Derek ENGI , Gonzalo SALGUEIRO , Julie ALLEN
摘要: In one embodiment, a device inserts a watcher module between a first module and a second module in a low-code workflow. The device intercepts, via the watcher module, output data being passed by the first module to the second module. The device determines whether the output data represents a policy violation. The device blocks, via the watcher module, the output data from being input to the second module, when the output data represents a policy violation.
-
公开(公告)号:US12080105B2
公开(公告)日:2024-09-03
申请号:US17378013
申请日:2021-07-16
CPC分类号: G06V40/50 , G06V20/00 , G06V40/172 , H04L63/0861
摘要: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.
-
公开(公告)号:US11729584B2
公开(公告)日:2023-08-15
申请号:US17350567
申请日:2021-06-17
发明人: Julie Allen , Fernando Molina Rodriguez , Andi Bridgett Cho , Matthew L. Sommer , Gonzalo Salgueiro , Pascale Delaunay
摘要: Techniques are for provided located-based contextual services to users by automatically creating location-based contextually relevant communication sessions that may take on a variety of forms, including contextual chats and micro-local services that are ephemeral, curated by a location owner and personalized by a user. As a user's context shifts throughout the day (from work to shopping to entertainment, etc.) the presented techniques filter content differently based on what the user may care about at a particular moment when the user is at a particular venue. The automatic creation and deletion of an ephemeral space/channel provides a dynamic application that changes its content or behavior based on a user's location. The user may control the interactivity level based on an adaptive user identifier by which a user's identity may take on different versions depending on location and time of day.
-
公开(公告)号:US20230018509A1
公开(公告)日:2023-01-19
申请号:US17378013
申请日:2021-07-16
摘要: This disclosure describes techniques for authenticating a user. For instance, a system may initially generate and then store authentication data for later authenticating the user. The authentication data may include biometrics data (e.g., facial recognition data), credentials data (e.g., a username, password, etc.), and/or environmental data (e.g., object(s) located within an environment). Later, the system may receive image data generated by a user device of the user. In some examples, the system may then analyze the image data using one or more facial recognition techniques in order to identify the user. The system may then use the authentication data, such as the environmental data, to determine that the image data further represents the object(s). Based on determining that the image data further represents the object(s), the system may then verify the user for access to a resource.
-
-
-
-