SECURITY FOR EMOJI BASED COMMANDS
First Claim
Patent Images
1. A security system for emoji based commands, comprising:
- a non-transitory memory storing instructions; and
one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising;
obtaining a first text associated with an emoji image and a second text;
determining a security measure based at least in part on the first text associated with the emoji image; and
determining a security level based at least in part on the second text and a plurality of historic messages.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of security for emoji based actions. The system and method may include processes such as obtaining a first text associated with an emoji image and a second text, determining to implement a security measure based at least in part on the first text associated with the emoji image, and determining a security level based at least in part on the second text.
49 Citations
20 Claims
-
1. A security system for emoji based commands, comprising:
-
a non-transitory memory storing instructions; and one or more hardware processors coupled to the non-transitory memory and configured to read the instructions from the non-transitory memory to cause the system to perform operations comprising; obtaining a first text associated with an emoji image and a second text; determining a security measure based at least in part on the first text associated with the emoji image; and determining a security level based at least in part on the second text and a plurality of historic messages. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory machine readable medium having stored thereon machine readable instructions executable to cause a machine to perform operations comprising:
-
identifying from a message a first text associated with an emoji image, a second text, and a sender identifier; determining, based at least in part on the first text and the second text, a command; determining a security measure associated with the command; and implementing the security measure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method of a security system for emoji based commands, the method comprising:
-
receiving a message comprising a first text associated with an emoji image and a second text; determining a command based at least in part on the first text and the second text; and selecting a first security measure from a plurality of security measures based at least in part on the command and a value determined from the second text. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification