Systems and methods for identifying unwanted photos stored on a device

    公开(公告)号:US11449542B2

    公开(公告)日:2022-09-20

    申请号:US15042070

    申请日:2016-02-11

    Abstract: Systems and methods are presented for identifying unwanted photos and videos on a device. Such systems may contain various modules to do one or more of: (i) review the image quality of photos and videos, (ii) review a user's interaction with photos and videos, (iii) review the properties of photos and videos, (iv) review the user's profile/preferences as to photos, or (v) review information obtained from additional sources regarding the user, his or her photos, and any interaction therewith. With one tap, an exemplary application can identify all of a user's unwanted photos, such as, for example: photos with bad lighting, blurry shots, similar photos, and even photos that the system predicts a user may find boring. Any photos that an exemplary system is unsure about may be left for the user to review and act upon. By analyzing user decisions exemplary systems become progressively more accurate and thus improve their predictions over time.

    HIGH-CONFIDENCE MALWARE SEVERITY CLASSIFICATION OF REFERENCE FILE SET

    公开(公告)号:US20220229906A1

    公开(公告)日:2022-07-21

    申请号:US17151462

    申请日:2021-01-18

    Abstract: A reference file set having high-confidence malware severity classification is generated by selecting a subset of files from a group of files first observed during a recent observation period and including them in the subset. A plurality of other antivirus providers are polled for their third-party classification of the files in the subset and for their third-party classification of a plurality of files from the group of files not in the subset. A malware severity classification is determined for the files in the subset by aggregating the polled classifications from the other antivirus providers for the files in the subset after a stabilization period of time, and one or more files having a third-party classification from at least one of the polled other antivirus providers that changed during the stabilization period to the subset are added to the subset.

    LOW LATENCY CLOUD-ASSISTED NETWORK SECURITY WITH LOCAL CACHE

    公开(公告)号:US20220210197A1

    公开(公告)日:2022-06-30

    申请号:US17138473

    申请日:2020-12-30

    Abstract: Latency in a cloud security service provided via a network security device is reduced by receiving in the network security device a new network connection request for a connection between a local network device and a remote server. If a locally cached rule is applicable to the new network connection request, the applicable locally cached rule is applied to selectively allow the new network connection based on the rule. If no locally cached rule is applicable to the new network connection request, the new network connection request is forwarded to the remote server and to a cloud security service, and a response from the remote server is selectively forwarded to the local network device only upon receiving a determination by the cloud security device as to whether the new network connection is a security risk.

    CONTENT FEED DELIVERY SYSTEM AND METHOD

    公开(公告)号:US20220182696A1

    公开(公告)日:2022-06-09

    申请号:US17111086

    申请日:2020-12-03

    Inventor: Bretislav Sopik

    Abstract: A method of providing a content feed. The method includes monitoring a plurality of user content streams of a plurality of users on a plurality of computing devices, the plurality of user content streams including a plurality of content instances accessible via a network. A plurality of archetypes are generated based on the plurality of user content streams. A selection of a particular archetype of the plurality of archetypes from a particular user is received on a particular computing device. A particular content stream is determined based on the particular archetype, and the particular content stream is delivered to the particular user via the particular computing device.

    PREDICTIVE PARENTAL CONTROLS FOR NETWORKED DEVICES

    公开(公告)号:US20220132208A1

    公开(公告)日:2022-04-28

    申请号:US17078961

    申请日:2020-10-23

    Abstract: Permissions in a parental control system are managed by evaluating a set of current permissions settings, current interests, and the age of at least one child subject to the current permissions to derive one or more suggested modifications to the current permissions. The one or more suggested modifications are determined to be age appropriate for the at least one child and to be of interest to the child. The one or more current interests comprise prior usage data of the at least one child.

    Application monitoring and device restriction system and method

    公开(公告)号:US11244065B2

    公开(公告)日:2022-02-08

    申请号:US16519556

    申请日:2019-07-23

    Abstract: A method of controlling use of network-connectable devices is provided. First network requests from a first user device executing a first operating system are monitored, and applications operating in the foreground on the first user device during the first network requests are monitored. A model is trained based on the first network requests and based on the applications respectively operating in the foreground on the first user device during the first network requests. Second network requests from a second user device executing a second operating system are monitored, and the model is applied to the second network requests from the second user device to determine a particular application operating in the foreground on the second user device. A function of the second user device is restricted based on the determining of the particular application operating in the foreground on the second user device.

    COMPUTING DEVICE USE RESTRICTION SYSTEM

    公开(公告)号:US20210232661A1

    公开(公告)日:2021-07-29

    申请号:US17228064

    申请日:2021-04-12

    Abstract: A device control method includes monitoring location of a first user device of a first user and receiving an indication of a location of a second user device. The method further includes monitoring use of the second user device and determining a first time of use on the second user device. The first time of use on the second user device is allocated to a use time of a second user based on the location of the first user device relative to the location of the second user device, and a functional component of a third user device of the second user is disabled based at least on the use time of the second user.

    NETWORK SECURITY BLACKLIST DERIVED FROM HONEYPOT STATISTICS

    公开(公告)号:US20210120022A1

    公开(公告)日:2021-04-22

    申请号:US16659027

    申请日:2019-10-21

    Abstract: Data relating to attacks is collected in honeypots, including network address of attacks and time of attacks. The attack data is analyzed to generate a predicted likelihood of future attacks from network addresses in the activity data, and a network address blacklist is constructed including network addresses predicted likely to be a source of a future attack. The process is repeated over time, such that network addresses with no recent honeypot activity are removed from the blacklist.

Patent Agency Ranking