Image-Based Detection of Errors in Application State

    公开(公告)号:US20210141684A1

    公开(公告)日:2021-05-13

    申请号:US16682954

    申请日:2019-11-13

    Abstract: Systems and methods are disclosed herein for using screen shots of an application to evaluate whether the application is in a fault state. In an embodiment, a processor captures screen shots of a screen of an application during operation of the application. The processor applies a classifier to the captured screen shots, and determines, from output of the classifier, a state of the application. The processor evaluates whether the determined state is a fault state of the application. Responsive to determining that the determined state is a fault state of the application, the processor prompts a user with an alert indicating the fault state and a corresponding point during the operation that exhibited the fault state.

    Primary domain and secondary domain authentication

    公开(公告)号:US11477189B2

    公开(公告)日:2022-10-18

    申请号:US16926224

    申请日:2020-07-10

    Abstract: A computer system receives a first request as part of a primary session with a client device to access information stored on a primary domain associated with the computer system. The first request includes an authentication key that was generated using a session key. The computer system receives a second request as part of a sub-session with the client device to access information stored on a secondary domain associated with the computer system. The second request includes a second authentication key that includes a session identifier of the primary session and a session payload generated using the session key and an indicator of the secondary domain. The computer system determines whether to grant the first and second requests using the first and second authentication keys, respectively.

    Image-based detection of errors in application state

    公开(公告)号:US11086707B2

    公开(公告)日:2021-08-10

    申请号:US16682954

    申请日:2019-11-13

    Abstract: Systems and methods are disclosed herein for using screen shots of an application to evaluate whether the application is in a fault state. In an embodiment, a processor captures screen shots of a screen of an application during operation of the application. The processor applies a classifier to the captured screen shots, and determines, from output of the classifier, a state of the application. The processor evaluates whether the determined state is a fault state of the application. Responsive to determining that the determined state is a fault state of the application, the processor prompts a user with an alert indicating the fault state and a corresponding point during the operation that exhibited the fault state.

    Live data viewing security
    4.
    发明授权

    公开(公告)号:US11630907B2

    公开(公告)日:2023-04-18

    申请号:US16834376

    申请日:2020-03-30

    Abstract: The techniques utilize an authentication process to authenticate the user to view protected data and an image monitoring process to monitor the field of view of the image detection component. When a user requests access to the protected data, the authentication process is activated. After a user is authenticated, the data may be displayed and an image monitoring process is activated and may use the image detection component to monitor the field of view to determine whether the user is actively viewing the data or that an additional person is in the field of view. When either event is detected, the protected data is concealed at the display of the user device.

    Systems, methods, and devices for hybrid implementation of native and web components

    公开(公告)号:US11514130B2

    公开(公告)日:2022-11-29

    申请号:US17121271

    申请日:2020-12-14

    Abstract: Systems, methods, and devices enable the display of native and web components of application. Devices are capable of identifying at least one native component and a plurality of web components that includes a first web component and a second web component, wherein the at least one native component and the plurality of web components are configured to be displayed on a user interface screen. Devices are also capable of generating an image of the first web component and an image of the second web component, displaying the at least one native component at a location on the user interface screen that is between the image of the first web component and the image of the second web component.

    PRIMARY DOMAIN AND SECONDARY DOMAIN AUTHENTICATION

    公开(公告)号:US20220014513A1

    公开(公告)日:2022-01-13

    申请号:US16926224

    申请日:2020-07-10

    Abstract: A computer system receives a first request as part of a primary session with a client device to access information stored on a primary domain associated with the computer system. The first request includes an authentication key that was generated using a session key. The computer system receives a second request as part of a sub-session with the client device to access information stored on a secondary domain associated with the computer system. The second request includes a second authentication key that includes a session identifier of the primary session and a session payload generated using the session key and an indicator of the secondary domain. The computer system determines whether to grant the first and second requests using the first and second authentication keys, respectively.

    LIVE DATA VIEWING SECURITY
    7.
    发明申请

    公开(公告)号:US20210303717A1

    公开(公告)日:2021-09-30

    申请号:US16834376

    申请日:2020-03-30

    Abstract: The techniques utilize an authentication process to authenticate the user to view protected data and an image monitoring process to monitor the field of view of the image detection component. When a user requests access to the protected data, the authentication process is activated. After a user is authenticated, the data may be displayed and an image monitoring process is activated and may use the image detection component to monitor the field of view to determine whether the user is actively viewing the data or that an additional person is in the field of view. When either event is detected, the protected data is concealed at the display of the user device.

Patent Agency Ranking