GENERATING CONTEXTUAL COMPLIANCE POLICIES

    公开(公告)号:US20220385697A1

    公开(公告)日:2022-12-01

    申请号:US17818023

    申请日:2022-08-08

    申请人: VMWARE, INC.

    摘要: Examples of generating contextual compliance policies are described. A meeting invitation can be created by a meeting organizer. The meeting can have compliance rules associated therewith. A compliance policy that facilitates enforcement of the compliance rules during the meeting can be transmitted to attendee client devices and enforced by a management component running on the client devices.

    SECURING CONFIDENTIAL CONTENT IN A VIRTUAL MEETING

    公开(公告)号:US20220377056A1

    公开(公告)日:2022-11-24

    申请号:US17327137

    申请日:2021-05-21

    申请人: VMware, Inc.

    IPC分类号: H04L29/06 H04L9/14

    摘要: Systems and methods are described for securing confidential content in a virtual meeting. In an example, a host can create a meeting agenda that identifies attendees and access restrictions for the meeting. A server can generate encryption keys corresponding to different confidentiality levels of content identified in the agenda. The encryption keys can be provided to user devices of the attendees based on the access permissions of the attendees. As the virtual meeting takes place, the server can encrypt confidential portions of the content stream for the meeting using the encryption keys. In an example, the server can also apply a machine learning algorithm to identify any confidential content in the content stream not previously identified. The server can encrypt additional confidential content where appropriate using encryption keys corresponding to the confidentiality level of the content.

    PERSONALIZED INFORMATIONAL USER EXPERIENCES USING VISUAL CONTENT

    公开(公告)号:US20230412887A1

    公开(公告)日:2023-12-21

    申请号:US17750337

    申请日:2022-05-21

    申请人: VMware, Inc.

    摘要: Disclosed are various examples for to generating personalized user experiences in the form of short-form videos that summarize informational topics that are selected to present to a user according at least one of a user context or a user interest. As the informational topics are identified for a given user, the informational topics can be applied as inputs to a recommendation model that is trained to recommend one or more of the topics to summarize and present to a user in visual form based on at least one of the user context or the user interest. Once a topic is recommended by the recommendation model, a video or other type of visual content can be automatically generated and presented to a user to allow the user to consume the information in the summarized form.

    Securing confidential content in a virtual meeting

    公开(公告)号:US11736454B2

    公开(公告)日:2023-08-22

    申请号:US17327137

    申请日:2021-05-21

    申请人: VMware, Inc.

    IPC分类号: H04L9/40 H04L9/14

    CPC分类号: H04L63/0428 H04L9/14

    摘要: Systems and methods are described for securing confidential content in a virtual meeting. In an example, a host can create a meeting agenda that identifies attendees and access restrictions for the meeting. A server can generate encryption keys corresponding to different confidentiality levels of content identified in the agenda. The encryption keys can be provided to user devices of the attendees based on the access permissions of the attendees. As the virtual meeting takes place, the server can encrypt confidential portions of the content stream for the meeting using the encryption keys. In an example, the server can also apply a machine learning algorithm to identify any confidential content in the content stream not previously identified. The server can encrypt additional confidential content where appropriate using encryption keys corresponding to the confidentiality level of the content.

    Generating contextual compliance policies

    公开(公告)号:US11411758B2

    公开(公告)日:2022-08-09

    申请号:US17068549

    申请日:2020-10-12

    申请人: VMWARE, INC.

    摘要: Examples of generating contextual compliance policies are described. A meeting invitation can be created by a meeting organizer. The meeting can have compliance rules associated therewith. A compliance policy that facilitates enforcement of the compliance rules during the meeting can be transmitted to attendee client devices and enforced by a management component running on the client devices.