Search

US-12626227-B2 - Dynamic meeting space configuration based on content

US12626227B2US 12626227 B2US12626227 B2US 12626227B2US-12626227-B2

Abstract

The present disclosure relates to dynamic meeting space configuration based on content. A client device can detect an entry of a user into a meeting space and notify a management service of the entry of the user into the meeting space. The client device can receive an access token from the management service and provide an access request for an enterprise resource to an enterprise resource service, where the access request comprises the access token. The client device can receive the enterprise resource from the enterprise resource service. The client device can provide data regarding the security classification of the enterprise resource to an edge device located within the meeting space. The client device can receive, from the edge device, a confirmation that a plurality of internet of things (IoT) devices located within the meeting space have been configured according to the security classification of the enterprise resource. The client device can provide the enterprise resource to at least one of the IoT devices for exhibition within the meeting space.

Inventors

  • Rohit Pradeep Shetty
  • RAMANANDAN NAMBANNOR KUNNATH

Assignees

  • OMNISSA, LLC

Dates

Publication Date
20260512
Application Date
20230329
Priority Date
20230118

Claims (15)

  1. 1 . A system comprising: at least one computing device comprising a processor and a memory; and machine-readable instructions stored in the memory that, when executed by the processor, cause the at least one computing device to at least: detect an entry of a user into a meeting space based on a client device that has been registered for management with a management service; provide, to the management service, a notification of the entry of the user into the meeting space, the notification including data identifying the user of the client device and a meeting session scheduled in the meeting space, wherein the management service generates an access token to indicate the client device's authorization to access an enterprise resource based on the data identifying the user of the client device; receive, from the management service, the access token and provide an access request for the enterprise resource to an enterprise resource service, the access request including the access token; receive the enterprise resource from the enterprise resource service; detect a request to display or exhibit the enterprise resource in the meeting space during the meeting session; receive, from the management service in response to the request, data regarding a security classification of the enterprise resource, wherein the security classification indicates a level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; provide the data regarding the security classification of the enterprise resource to an edge device located within the meeting space, wherein providing the data causes the edge device to generate one or more commands that enable, disable or configure functionality of a plurality of internet of things (IoT) devices located within the meeting space according to the security classification of the enterprise resource to enforce the level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; receive, from the edge device, a confirmation that the plurality of IoT devices have been configured according to the security classification of the enterprise resource; and provide the enterprise resource to at least one of the IoT devices for display or exhibition within the meeting space.
  2. 2 . The system of claim 1 , wherein the machine-readable instructions, when executed by the processor, further cause the computing device to at least: provide data associated with the user to a beacon device located within the meeting space; and receive data associated with the meeting space from the beacon device.
  3. 3 . The system of claim 1 , wherein the access request comprises an identifier for an enterprise resource and the access token.
  4. 4 . The system of claim 1 , wherein the machine-readable instructions, when executed by the processor, further cause the computing device to at least receive a refresh token corresponding to the access token from the management service.
  5. 5 . The system of claim 1 , wherein detecting the entry of the user into the meeting space further comprises: detecting, by the client device, a signal of a beacon device that includes a unique identifier of the beacon device or the meeting space; transmitting an identifier of the client device to the beacon device; and receiving, by the client device from the beacon device, data regarding the meeting space.
  6. 6 . A method, comprising: detecting an entry of a user into a meeting space based on a client device that has been registered for management with a management service; providing, to the management service, a notification of the entry of the user into the meeting space, the notification including data identifying the user of the client device and a meeting session scheduled in the meeting space, wherein the management service generates an access token to indicate the client device's authorization to access an enterprise resource based on the data identifying the user of the client device; receiving, from the management service, the access token and providing an access request for the enterprise resource to an enterprise resource service, the access request including the access token; receiving the enterprise resource from the enterprise resource service; detecting a request to display or exhibit the enterprise resource in the meeting space during the meeting session; receiving, from the management service in response to the request, data regarding a security classification of the enterprise resource, wherein the security classification indicates a level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; providing the data regarding the security classification of the enterprise resource to an edge device located within the meeting space, wherein providing the data causes the edge device to generate one or more commands that enable, disable or configure functionality of a plurality of internet of things (IoT) devices located within the meeting space according to the security classification of the enterprise resource to enforce the level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; receiving, from the edge device, a confirmation that the plurality of IoT devices have been configured according to the security classification of the enterprise resource; and providing the enterprise resource to at least one of the IoT devices for display or exhibition within the meeting space.
  7. 7 . The method of claim 6 , further comprising: providing data associated with the user to a beacon device located within the meeting space; and receiving data associated with the meeting space from the beacon device.
  8. 8 . The method of claim 6 , wherein the access request comprises an identifier for an enterprise resource and the access token.
  9. 9 . The method of claim 6 , further comprising receiving a refresh token corresponding to the access token from the management service.
  10. 10 . The method of claim 6 , wherein detecting the entry of the user into the meeting space further comprises: detecting, by the client device, a signal of a beacon device that includes a unique identifier of the beacon device or the meeting space; transmitting an identifier of the client device to the beacon device; and receiving, by the client device from the beacon device, data regarding the meeting space.
  11. 11 . A non-transitory computer-readable medium embodying program instructions that, when executed by a computing device, cause the computing device to at least: detect an entry of a user into a meeting space based on a client device that has been registered for management with a management service; provide, to the management service, a notification of the entry of the user into the meeting space, the notification including data identifying the user of the client device and a meeting session scheduled in the meeting space, wherein the management service generates an access token to indicate the client device's authorization to access an enterprise resource based on the data identifying the user of the client device; receive, from the management service, the access token and provide an access request for the enterprise resource to an enterprise resource service, the access request including the access token; receive the enterprise resource from the enterprise resource service; detect a request to display or exhibit the enterprise resource in the meeting space during the meeting session; receive, from the management service in response to the request, data regarding a security classification of the enterprise resource, wherein the security classification indicates a level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; provide the data regarding the security classification of the enterprise resource to an edge device located within the meeting space, wherein providing the data causes the edge device to generate one or more commands that enable, disable or configure functionality of a plurality of internet of things (IoT) devices located within the meeting space according to the security classification of the enterprise resource to enforce the level of security to be implemented within the meeting space where the enterprise resource is being displayed or exhibited during the meeting session; receive, from the edge device, a confirmation that the plurality of IoT devices have been configured according to the security classification of the enterprise resource; and provide the enterprise resource to at least one of the IoT devices for display or exhibition within the meeting space.
  12. 12 . The non-transitory computer-readable medium of claim 11 , wherein the program instructions, when executed, further cause the computing device to at least: provide data associated with the user to a beacon device located within the meeting space; and receive data associated with the meeting space from the beacon device.
  13. 13 . The non-transitory computer-readable medium of claim 11 , wherein the machine-readable instructions, when executed, further cause the computing device to at least: receive a refresh token corresponding to the access token from the management service.
  14. 14 . The non-transitory computer-readable medium of claim 13 , wherein the access request comprises an identifier for an enterprise resource and the access token.
  15. 15 . The non-transitory computer-readable medium of claim 11 , wherein detecting the entry of the user into the meeting space further comprises: detecting, by the client device, a signal of a beacon device that includes a unique identifier of the beacon device or the meeting space; transmitting an identifier of the client device to the beacon device; and receiving, by the client device from the beacon device, data regarding the meeting space.

Description

RELATED APPLICATIONS Benefit is claimed under 35 U.S.C. 119(a)-(d) to Foreign Application Serial No. 202341003606 filed in India entitled “DYNAMIC MEETING SPACE CONFIGURATION BASED ON CONTENT”, on Jan. 18, 2023, by VMware, Inc., which is herein incorporated in its entirety by reference for all purposes. BACKGROUND Today, enterprise meeting rooms are quickly being transformed into smart meeting spaces filled with internet-of-things (IoT) devices such as a smart displays, smart lighting, smart boards, smart conferencing solutions. Thus, each meeting space can itself be an IoT system where multiple IoT devices are operated by a controller device and may be enrolled with a management system. Thus, participants of meeting sessions held in a meeting space can control or configure each IoT device to suit the needs of the meeting session. BRIEF DESCRIPTION OF THE DRAWINGS For a more complete understanding of the embodiments and the advantages thereof, reference is now made to the following description, in conjunction with the accompanying figures briefly described as follows: FIG. 1 shows an example of a pictorial diagram illustrating a meeting space, according to various embodiments of the present disclosure. FIG. 2 show an example of a network environment, according to various embodiments of the present disclosure. FIGS. 3A-B shown examples of a sequence diagram that provides one example of the interactions between various components of the network environment, according to various embodiments of the present disclosure. DETAILED DESCRIPTION The present disclosure relates to dynamic meeting space configuration based on content. With the advent of IoT-enabled meeting spaces, employees and other enterprise users are faced physical security concerns when exhibiting secure enterprise content during a meeting session. For example, passersby or other unauthorized persons outside a meeting space could eavesdrop on a meeting session and thereby see or hear secure content being exhibited during the meeting session. To address these issues, the present disclosure leverages the capabilities of IoT-enabled meeting spaces to maintain the security of enterprise resources exhibited during meeting sessions. In particular, the IoT devices within a meeting space could be dynamically configured to match a level of security necessitated by a particular enterprise resource. One the one hand, if an enterprise resource being exhibited needs no elevated security, meeting participants can have full control over the configurations of the IoT devices. On other hand, if an enterprise resource includes secure content, those IoT devices can be dynamically configured to reduce the chance of that secure content being exposed to unauthorized persons. Likewise, meeting participants may be restricted from changing the IoT devices from their secure configurations. FIG. 1 is a pictorial diagram illustrating an enterprise meeting space 100. The meeting space 100 can be a room or other similar space in which employees or other persons affiliated with an enterprise can hold a meeting session. The meeting space 100 can host various meeting participants, including a user having a client device 106. The meeting space 100 can be equipped with various devices to facilitate the meeting session, including a beacon device 109, an edge device 112, and various IoT devices 115 (e.g., IoT devices 115a-d). A user in possession of a client device 106 can use an enterprise application installed on the client device 106 to conduct various aspects of the meeting session, including exhibiting one or more enterprise resources 127 (shown in FIG. 2) to the meeting session participants. The beacon device 109 can detect the user's presence in the meeting space 100 via the client device 106. That way, a management service 121 (shown in FIG. 2) can be alerted of the user's presence and permit the user to access enterprise resources 127. Then, the user can, via the client device 106, communicate with the edge device 112 to operate the IoT devices 115. Using one or more of the IoT devices 115, the user can exhibit the enterprise resource 127 to the meeting participants. For example, the user can display visual elements of the enterprise resource 127 using a display device 115a, or allow participants to hear audio elements of the enterprise resource 127 using a speaker device 115b. But if the enterprise resource 127 includes any secure content, the configurations of the IoT devices 115 can be modified to preserve security from any passersby or others who may be unauthorized to see or hear the secure content. For example, the brightness of the display device 115a or the audio output volume of the speaker device 115b can be limited. As another example, a lighting device 115c can be dimmed, or window blinds 115d can be closed. These modified configurations can help to reduce the chance of exposure of secure content to unauthorized persons outside the meeting space 100. FIG. 2, shown