-
公开(公告)号:US20210210103A1
公开(公告)日:2021-07-08
申请号:US16801176
申请日:2020-02-26
申请人: VMWARE, INC.
IPC分类号: G10L17/24 , G10L13/027 , G10L15/22 , G10L15/26 , G06F21/33
摘要: Disclosed are various approaches for assisting a user with skill or application discovery in a voice assistant device. By assisting the user in this way, avoiding the launching of malicious skills or applications can also be avoided. Additionally, restricting launching of applications to particular users or particular voice assistant devices can also be accomplished.
-
公开(公告)号:US20230328065A1
公开(公告)日:2023-10-12
申请号:US18327687
申请日:2023-06-01
申请人: VMware, Inc.
发明人: Chaoting Xuan , Kar-Fai Tse , Suyu Pan
IPC分类号: H04L67/63 , H04L67/561 , H04L67/141 , H04L9/40 , H04L67/53 , H04L67/563
CPC分类号: H04L63/0884 , H04L63/08 , H04L63/083 , H04L63/20 , H04L67/141 , H04L67/53 , H04L67/561 , H04L67/563 , H04L67/63
摘要: Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.
-
公开(公告)号:US11593155B2
公开(公告)日:2023-02-28
申请号:US16913988
申请日:2020-06-26
申请人: VMware, Inc.
发明人: Lin Lv , Chaoting Xuan , Xinda Yan , Qimin Yao , Yunxia Cheng , Qian Liu
IPC分类号: G06F8/34 , G06F9/48 , G06F16/245 , G06F16/2457 , G06F16/248 , G06F3/04847 , H04L9/40 , G06F3/0482
摘要: Disclosed are various approaches for workflow service application networking. In some aspects, a workflow creation user interface is provided to create a networking workflow with at least one networking action. A networking action is specified for a first application to utilize application content from a second application. The networking action is verified based on a response to a test action request transmitted to the workflow service. The networking action is transmitted from the workflow application to a workflow service to cause the first application to utilize the application content from the second application according to the networking action.
-
公开(公告)号:US11570165B2
公开(公告)日:2023-01-31
申请号:US16785682
申请日:2020-02-10
申请人: VMWARE, INC.
摘要: Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user is prompted to use a client device, such as a smartphone, to facilitate an authentication flow. A soundwave is played through the client device that contains a secret key, which is then sent to a service that validates the secret key. An association between the user account and the voice assistant device can then be created so that access to third party services can occur.
-
公开(公告)号:US11418543B2
公开(公告)日:2022-08-16
申请号:US16431821
申请日:2019-06-05
申请人: VMware, Inc.
发明人: Chaoting Xuan
摘要: Disclosed are various approaches for automating the detection and identification of security issues. A plurality of signals received from a plurality of security devices are analyzed to identify a predicted security incident, each of the plurality of signals indicating a potential security issue. A confidence score is then calculated for the predicted security incident. At least one compliance policy is then evaluated to determine whether to perform a remedial action specified in the compliance policy, wherein a determination to perform the remedial action is based at least in part on the confidence score. Finally, the remedial action is performed in response to an evaluation of the at least one compliance policy.
-
公开(公告)号:US11075755B2
公开(公告)日:2021-07-27
申请号:US16393033
申请日:2019-04-24
申请人: VMware, Inc.
发明人: Chaoting Xuan , Qimin Yao , Litao Shen
摘要: Disclosed are various embodiments for implementing a key escrow system without disclosure of a client's encryption key to third parties. An encryption key is split into a plurality of key segments pursuant to a shared secret protocol. A plurality of peer client devices are then identified. Each peer client device in the plurality of peer client devices is then verified and the respective one of the plurality of key segments are sent to a respective one of the plurality of peer client devices. A response is then received from each respective one of the plurality of peer client devices, the response confirming receipt of the respective one of the plurality of key segments. A list identifying the plurality of peer client devices is finally provided to a key escrow service, the list comprising key-value pairs that identify each respective one of the plurality of peer client devices and the respective one of the plurality of key segments.
-
公开(公告)号:US20210216656A1
公开(公告)日:2021-07-15
申请号:US15930284
申请日:2020-05-12
申请人: VMware, Inc.
发明人: Chaoting Xuan , Lin Lv , Suyu Pan , Guoxin Liu , Qimin Yao , Yue Zhao
摘要: Systems and methods can allow for secure cross-device sharing of transient data using direct transient data sharing (“DTDS”). A source destination can share data using local DTDS with an agent on a first device. The agent can send the data to a hub server that runs a security control process and data formatting process. The hub server can determine risk scores for the source and destination devices and allow the sharing to occur if a safety threshold is met. Then an agent on the destination device can receive the transient data and use local DTDS to send the data to a destination application.
-
公开(公告)号:US20210176229A1
公开(公告)日:2021-06-10
申请号:US16785682
申请日:2020-02-10
申请人: VMWARE, INC.
摘要: Disclosed are various approaches for authenticating a user through a voice assistant device and creating an association between the device and a user account. The request is associated with a network or federated service. The user is prompted to use a client device, such as a smartphone, to facilitate an authentication flow. A soundwave is played through the client device that contains a secret key, which is then sent to a service that validates the secret key. An association between the user account and the voice assistant device can then be created so that access to third party services can occur.
-
公开(公告)号:US20210027155A1
公开(公告)日:2021-01-28
申请号:US16519338
申请日:2019-07-23
申请人: VMware, Inc.
发明人: Ravish Chawla , Kar-Fai Tse , Chaoting Xuan
摘要: Examples described herein include systems and methods for implementing customized, on-device processing workflows. An example method can include training different natural language processing (“NLP”) models using distinct datasets relevant to different backend systems. The different NLP models can be assigned to user devices based on each device user's organizational group. The user devices can implement the customized NLP models to detect triggers within text of an application. Based on the detected trigger, the application can display a user interface element having a selectable actionable button for carrying out an action with respect to the backend system. In some examples, the detected trigger can automatically cause an action to be carried out with respect to the backend system.
-
公开(公告)号:US11830098B2
公开(公告)日:2023-11-28
申请号:US16794265
申请日:2020-02-19
申请人: VMWARE, INC.
发明人: Rohit Pradeep Shetty , Erich Peter Stuntebeck , Ramani Panchapakesan , Suman Aluvala , Chaoting Xuan
IPC分类号: G10L15/22 , G06Q50/26 , G06Q10/109 , G06Q10/107 , G10L15/30 , G06F21/74
CPC分类号: G06Q50/265 , G06F21/74 , G06Q10/107 , G06Q10/109 , G10L15/22 , G10L15/30 , G10L2015/223
摘要: Disclosed are various examples for audio data leak prevention using user and device contexts. In some examples, a voice assistant device can be connected to a remote service that provides enterprise data to be audibly emitted by the voice assistant device. In response to a request for the enterprise data being received from the voice assistant device, an audio signal can be generated that audibly broadcasts the enterprise data. The audio signal can be generated to audibly redact at least a portion of the enterprise data based at least in part on a mode of operation of the voice assistant device. The voice assistant device can be directed to emit the enterprise data through a playback of the audio signal.
-
-
-
-
-
-
-
-
-