Patent classifications
G06F2221/032
Enforcing authorization policies for computing devices
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for enforcing policies for computing devices. In some implementations, content for presentation by an electronic device is received. Context data indicating a current context of the electronic device is obtained. Policy data indicating a policy corresponding to at least one of the electronic device, a user of the electronic device, the content for presentation, or data associated with the content is accessed. The policy indicates one or more context-dependent limitations on presentation of the content by the electronic device. Presentation of the content by the electronic device is managed based on a set of actions the policy permits for the current context.
AUTOMATIC OBSCURATION OF A PORTION OF A SCREEN-SHARE VIEW
The technology disclosed herein enables automatic obscuration of a portion of a view shared during a screen sharing session. In a particular embodiment, a method includes receiving a view displayed by a first user system to a first user. The method further includes identifying a portion of the view not to be shared and obscuring the portion of the view to generate a shared view. Also, the method includes transmitting the shared view to a second user system over a real-time screen sharing session, wherein the second user system displays the shared view to a second user.
System and method of changing the password of an account record under a threat of unlawful access to user data
Disclosed herein are systems and methods for changing a password of an account record under a threat of unlawful access to user data. In one aspect, an exemplary method comprises generating, by an account records generator, a set of known user account records and sending the generated set of known user account records to a determination module, identifying, by the determination module, a use of at least one user account record from the generated set, and sending, to a verification module, data about the at least one user account record, performing, by the verification module, a verification of a presence of a threat of unlawful access to user data, the unlawful access being performed using the at least one user account record and performing, by a change module, the changing of a password of the at least one user account record the use of which has been identified.
SECURING DISPLAYED DATA ON COMPUTING DEVICES
Techniques for securing displayed data on computing devices are disclosed. One example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. In response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. In response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked.
Projected vector modification as mitigation for machine learning model string stuffing
An artifact is received from which features are extracted so as to populate a vector. The features in the vector can be reduced using a feature reduction operations to result in a modified vector having a plurality of buckets. A presence of predetermined types of features are identified within buckets of the modified vector influencing a score above a pre-determined threshold. A contribution of the identified features within the high influence buckets of the modified vector is then attenuated. The modified vector is input into a classification model to generate a score which can be provided to a consuming application or process. Related apparatus, systems, techniques and articles are also described.
Providing audio visual privacy controls
Audio visual privacy controls can be provided. A privacy service can be configured to interface with multiple filter drivers that are loaded above components of an AV platform to enable the privacy service to selectively block a particular AV app's access to an AV device based on context. A privacy service may leverage a first filter driver to identify an AV app and may leverage a second filter driver to block the AV app's access. The privacy service may consider different types and combinations of context to determine when access to an AV device's stream should be blocked.
SINGLE DEVICE INDEPENDENT BACKEND INTERFACE TO A FRONTEND INTERFACE OF A MICROSERVICE
An Application Programming Interface (API) is provided for interaction between a User Interface (UI) of a device and microservices provided from a cloud processing environment. The API provides a single device-type independent backend to the frontends of the microservices. The UI defines the data types and specific data that it needs for processing from a given microservice. The backend calls the appropriate microservice through the corresponding frontend of the microservice. The microservice may engage other microservices resulting in output being returned to the backend. The backend provides only the output associated with the data types and the specific data back to the UI.
Watermark security
Apparatuses, methods, systems, and program products are disclosed for watermark security. An apparatus includes a watermark module configured to generate a digital watermark to be presented as part of a graphical interface based on data presented on the graphical interface. A digital watermark verifies an authenticity of data to be presented in a graphical interface. An apparatus includes a presentation module configured to embed the digital watermark into the graphical interface prior to the data being presented in the graphical interface such that the digital watermark is graphically imperceptible to a user, dynamically update the digital watermark during runtime in response to detecting a change in the at least a portion of the data that is encoded into the digital watermark, and re-embed the digital watermark into the graphical interface in response to the digital watermark being updated.
BULK SNAPSHOT RECOVERY
Subject matter related to data management is disclosed. A request to restore target objects of a computing system may be received, where a data management system may store multiple snapshots for the target objects and metadata for the snapshots. The snapshots may be filtered using metadata for the snapshots to obtain a set of snapshots that are available for restoring respective target objects. From among the set of snapshots, suggested snapshots that are available for restoring respective target objects may be identified. The suggested snapshots may be indicated.
SYSTEM AND METHOD FOR DETERRING DATA LEAKAGE THROUGH PHOTOGRAPHING OF DISPLAY SCREEN BY EXTERNAL CAMERA
A system and/or a method for deterring data leakage through photographing of display screen by external camera. A digital content displayed on the digital device is detected, and a classification type of the digital content is identified. When the classification type is one of the predefined types, the user information associated with the digital device is obtained based on which a visual noise to be displayed on the digital device is fetched from database. The fetched visual noise is displayed along with the digital content to deter the leakage of information from the displayed digital content through an external image capturing device. The visual noise that is displayed comprises either or combination of: modifying, at least one character in the digital content with the visual noise or overlaying the visual noise on the at least one character in the digital content.