-
公开(公告)号:US11721116B2
公开(公告)日:2023-08-08
申请号:US17708079
申请日:2022-03-30
申请人: VMware, Inc.
IPC分类号: G06V30/142 , G06F21/62 , G06Q10/10 , G06V30/148 , G06V30/416 , H04N23/60 , G06V30/10
CPC分类号: G06V30/142 , G06F21/6245 , G06Q10/10 , G06V30/153 , G06V30/416 , H04N23/60 , G06V30/10
摘要: Disclosed are various embodiments that relate to a system or a method for managing individual actions. In one example, among others, a system includes a client device that is configured to display a camera user interface for capturing an image and identify an action that stores the image captured in the memory. An image tag that describes the image is generated. The client device is configured to determine that the image has enterprise content based on the image tag and determine an enterprise policy to apply to the enterprise content. Text content from the image is extracted based on the enterprise policy. The client device is configured to display a user interface that includes the text content extracted from the image and transmit the text content of the image to an application based on the enterprise policy.
-
公开(公告)号:US20230129849A1
公开(公告)日:2023-04-27
申请号:US17507466
申请日:2021-10-21
申请人: VMware, Inc.
IPC分类号: G06F40/186 , G06F40/205 , G06F40/134 , G06Q10/10 , G06Q10/00 , G06N20/00
摘要: Systems and methods are described for creating tasks for an action-based checklist. In an example, a checklist system can receive a body of text, such as text from an email, calendar invite, or document. The checklist system can extract words in the text body that correspond to a task description component of stored task templates. Based on the extracted words, the checklist system can identify an applicable task template. The checklist system can parse utterances in the text body and identify an entity value based on example utterances provided in the task template. The checklist system can insert the entity value into placeholders in the task template and generate task from the task template. The checklist system can add the task to a checklist that is provided to a user device.
-
公开(公告)号:US20220215067A1
公开(公告)日:2022-07-07
申请号:US17142112
申请日:2021-01-05
申请人: VMware, Inc.
IPC分类号: G06F16/957 , G06N20/00 , H04L12/58 , G06F16/955
摘要: Systems and methods are described for extracting and populating content from an email link. In an example, a machine learning (“ML”) model can be trained based on user interactions with emails. When an email is received for the user, the ML model can be applied to score the email. An application can extract a link in the email. The application can retrieve a web page with the link and store it locally. The application can create a card for the email that includes the link and insert the card into a graphical user interface (“GUI”). A user can access the GUI and select the card. The web page can be retrieved from the local storage and displayed in the GUI.
-
公开(公告)号:US11122423B2
公开(公告)日:2021-09-14
申请号:US16453357
申请日:2019-06-26
申请人: VMware, Inc.
摘要: Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. A user account can be implicitly authenticated based on proximity of a client device to the voice assistant device. An association between the user account and the voice assistant device can then be created.
-
公开(公告)号:US10708268B2
公开(公告)日:2020-07-07
申请号:US15664215
申请日:2017-07-31
申请人: VMware, Inc.
发明人: Chaoting Xuan , Kar-Fai Tse , Suyu Pan
摘要: Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to receive a request to initiate an application proxy service. The program instructions can cause the computing device to authenticate the request based on an access token. The program instructions can cause the computing device to initiate an application proxy service session with a second computing device, where the second computing device provides input data to the application proxy service. The computing device can also initiate an application session associated with an application service, where the application proxy service provides the input data to the application service. The computing device also can apply a compliance policy as data is communicated between the second computing device and the application service.
-
公开(公告)号:US11763231B2
公开(公告)日:2023-09-19
申请号:US16958530
申请日:2020-05-27
申请人: VMware, Inc.
发明人: Lin Lv , Chaoting Xuan , Xinda Yan , Qimin Yao , Yunxia Cheng , Qian Liu
IPC分类号: G06Q10/0633
CPC分类号: G06Q10/0633
摘要: Disclosed are various approaches for workflow service application stating. In some aspects, an application content request is transmitted to a workflow service. The application content request can request updated states from a network service that acts as a back end for the application. The application content can be provided to the client device or other installed applications, without having opened the application on a client device.
-
公开(公告)号:US20230275918A1
公开(公告)日:2023-08-31
申请号:US18315049
申请日:2023-05-10
申请人: VMware, Inc.
发明人: Kar-Fai Tse , Chaoting Xuan , Ravish Chawla , Erich Stuntebeck , Stephen Jonathan Parry-Barwick
IPC分类号: H04L9/40 , H04L41/0604 , H04L41/0813 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149
CPC分类号: H04L63/1425 , H04L63/1416 , H04L63/1441 , H04L41/0627 , H04L63/20 , H04L41/0813 , H04L63/102 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149 , H04L43/16
摘要: Disclosed are various approaches for automating the detection and identification of anomalous devices in a management service. Device check-ins are received by a management service and housed in a data store. The quantity of device check-ins over various time periods can be analyzed using various approaches to identify anomalous devices.
-
公开(公告)号:US11652832B2
公开(公告)日:2023-05-16
申请号:US16918033
申请日:2020-07-01
申请人: VMware, Inc.
发明人: Kar-Fai Tse , Chaoting Xuan , Ravish Chawla , Erich Stuntebeck , Stephen Jonathan Parry-Barwick
IPC分类号: H04L9/40 , H04L41/0604 , H04L41/0813 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149 , H04L43/16 , H04L43/10 , H04L43/0876 , H04L43/028
CPC分类号: H04L63/1425 , H04L41/0627 , H04L41/0813 , H04L41/147 , H04L41/149 , H04L43/0817 , H04L63/102 , H04L63/1416 , H04L63/1441 , H04L63/20 , H04W12/121 , H04W12/37 , H04L43/028 , H04L43/0876 , H04L43/10 , H04L43/16
摘要: Disclosed are various approaches for automating the detection and identification of anomalous devices in a management service. Device check-ins are received by a management service and housed in a data store. The quantity of device check-ins over various time periods can be analyzed using various approaches to identify anomalous devices.
-
公开(公告)号:US20220222953A1
公开(公告)日:2022-07-14
申请号:US17708079
申请日:2022-03-30
申请人: VMware, Inc.
IPC分类号: G06V30/148 , G06F21/62 , G06Q10/10 , H04N5/232 , G06V10/10 , G06V30/416
摘要: Disclosed are various embodiments that relate to a system or a method for managing individual actions. In one example, among others, a system includes a client device that is configured to display a camera user interface for capturing an image and identify an action that stores the image captured in the memory. An image tag that describes the image is generated. The client device is configured to determine that the image has enterprise content based on the image tag and determine an enterprise policy to apply to the enterprise content. Text content from the image is extracted based on the enterprise policy. The client device is configured to display a user interface that includes the text content extracted from the image and transmit the text content of the image to an application based on the enterprise policy.
-
公开(公告)号:US20220006823A1
公开(公告)日:2022-01-06
申请号:US16918033
申请日:2020-07-01
申请人: VMware, Inc.
发明人: Kar-Fai Tse , Chaoting Xuan , Ravish Chawla , Erich Stuntebeck , Stephen Jonathan Parry-Barwick
摘要: Disclosed are various approaches for automating the detection and identification of anomalous devices in a management service. Device check-ins are received by a management service and housed in a data store. The quantity of device check-ins over various time periods can be analyzed using various approaches to identify anomalous devices.
-
-
-
-
-
-
-
-
-