Abstract:
Implementations generally relate to providing secure video conferencing. In some implementations, a method includes performing a first encryption of a video stream, wherein the video stream has a first encryption layer from the first encryption. The method further includes performing a second encryption of the video stream, wherein the video stream has a second encryption layer from the second encryption. The method further includes enabling one or more remote nodes to decrypt the second encryption layer. The method further includes enabling one or more end-user nodes to decrypt the first encryption layer.
Abstract:
Systems and methods are disclosed for detecting when a video stream embedded within a region of another video stream contains copyrighted material. In one implementation, a computer system receives a first video stream and determines that the first video stream comprises a second video stream within a region of the first video stream, using metadata that identifies a set of geometric properties of the region. The computer system obtains the second video stream from the first video stream based on the set of geometric properties of the region, and determines whether the second video stream contains copyrighted material.
Abstract:
A system and method for identifying an entity from a message exchange thread and generating a suggestion that is directed to the entity, such as a suggestion for a user to take an action on the entity. A suggestion application receives at least one electronic message from a message exchange thread, identifies an entity that can be actionable from the electronic message, determines contextual indicators of the entity, determines whether the entity is actionable based on the contextual indicators, and responsive to the entity being actionable, provides a suggestion that is directed to the entity to a participant(s) of the message exchange thread.
Abstract:
Systems and methods are disclosed for identifying unauthorized presentation of protected content by one or more participants in a media collaboration. In one implementation, a processing device receives one or more content elements, each of the one or more content elements being provided within a media collaboration and associated with one or more users. The processing device identifies an unauthorized presentation of at least one of the one or more content elements within the media collaboration. Based on an identification of the unauthorized presentation, the processing device initiates one or more actions with respect to one or more of the users associated with the at least one of the one or more content elements.
Abstract:
Systems and methods are disclosed for identifying unauthorized presentation of protected content by one or more participants in a media collaboration. In one implementation, a processing device receives one or more content elements, each of the one or more content elements being provided within a media collaboration and associated with one or more users. The processing device identifies an unauthorized presentation of at least one of the one or more content elements within the media collaboration. Based on an identification of the unauthorized presentation, the processing device initiates one or more actions with respect to one or more of the users associated with the at least one of the one or more content elements.