SECURE ENTERPRISE ACCESS WITH VOICE ASSISTANT DEVICES

    公开(公告)号:US20220028398A1

    公开(公告)日:2022-01-27

    申请号:US17016367

    申请日:2020-09-09

    Applicant: VMWARE, INC.

    Abstract: Systems and methods are provided for optimizing and securing an enterprise voice service accessed by an external voice assistant device. An enterprise voice assistant installed on a client device acts as an enterprise voice service for an external voice assistant device. The enterprise voice assistant receives a voice query from the external voice assistant device. The voice query is processed using a machine learning model to extract an intent and at least one slot. The extracted intent and at least one slot are used to determine whether a response to the voice query can be generated using local enterprise data that was previously received and stored by the client device from a management server. The response is generated based on the determination by using the local enterprise data or by sending the extracted intent and at least one slot to and receiving the response from the management server.

    DISTRIBUTED ENCRYPTION
    3.
    发明申请

    公开(公告)号:US20210144132A1

    公开(公告)日:2021-05-13

    申请号:US17157367

    申请日:2021-01-25

    Applicant: VMware, Inc.

    Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.

    METHODS FOR IMPROVED INTERORGANIZATIONAL COLLABORATION

    公开(公告)号:US20220027855A1

    公开(公告)日:2022-01-27

    申请号:US17078121

    申请日:2020-10-23

    Applicant: VMWARE, INC.

    Abstract: Systems and methods are included for improved interorganizational collaboration. An agent on a server can crawl through data files to identify keywords relating to a product. The agent can create tags and assign the keywords to the tags. The agent can crawl through user-related data files to identify potential support users. The support users can be mapped to tags in a database. A user interacting with a chat application can request help with the product. The agent can extract keywords from the request and use them to identify a tag. The agent can map the tag to support users and using an algorithm can select a support user to send the help request to. If the support user denies the request or does not respond, the agent can send the request to another support user. Once a support user accepts the request, the agent can connect the users.

    DISTRIBUTED ENCRYPTION
    6.
    发明申请

    公开(公告)号:US20190166107A1

    公开(公告)日:2019-05-30

    申请号:US15898670

    申请日:2018-02-19

    Applicant: VMWARE. INC.

    Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.

    VOICE SKILL SESSION LIFETIME MANAGEMENT

    公开(公告)号:US20210211422A1

    公开(公告)日:2021-07-08

    申请号:US16801197

    申请日:2020-02-26

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various aspects of voice skill session lifetime management. In some examples, a session extension request is received. The session extension request extends a voice skill session of a voice-activated device. A personal client device is identified based on the session extension request. A command to emit an ultrasonic pulse is transmitted to the personal client device.

    DATA LEAK PREVENTION USING USER AND DEVICE CONTEXTS

    公开(公告)号:US20210209710A1

    公开(公告)日:2021-07-08

    申请号:US16794265

    申请日:2020-02-19

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples for audio data leak prevention using user and device contexts. In some examples, a voice assistant device can be connected to a remote service that provides enterprise data to be audibly emitted by the voice assistant device. In response to a request for the enterprise data being received from the voice assistant device, an audio signal can be generated that audibly broadcasts the enterprise data. The audio signal can be generated to audibly redact at least a portion of the enterprise data based at least in part on a mode of operation of the voice assistant device. The voice assistant device can be directed to emit the enterprise data through a playback of the audio signal.

    DISTRIBUTED ENCRYPTION
    10.
    发明公开

    公开(公告)号:US20230344811A1

    公开(公告)日:2023-10-26

    申请号:US18216367

    申请日:2023-06-29

    Applicant: VMware, Inc.

    Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.

Patent Agency Ranking