Patent application number | Description | Published |
20120291126 | Balancing Malware Rootkit Detection with Power Consumption on Mobile Devices - The subject disclosure presents a novel technique for balancing the tradeoff between security monitoring and energy consumption on mobile devices. Security/energy tradeoffs for host-based detectors focusing on rootkits are analyzed along two axes: a scanning frequency, and a surface of attack. Experimental results are applied to a hypervisor-based framework, and a sweet spot is identified to minimize both energy consumption and a window of vulnerability for critical operating system objects such as code pages and kernel data. | 11-15-2012 |
20130019292 | Devices, Systems and Methods for Security Using Magnetic Field Based IdentificationAANM Varshavsky; AlexanderAACI East HanoverAAST NJAACO USAAGP Varshavsky; Alexander East Hanover NJ USAANM Li; Kevin AnsiaAACI ChathamAAST NJAACO USAAGP Li; Kevin Ansia Chatham NJ US - Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location. | 01-17-2013 |
20130019306 | Remote-Assisted Malware DetectionAANM Lagar-Cavilla; Horacio AndresAACI Morris PlainsAAST NJAACO USAAGP Lagar-Cavilla; Horacio Andres Morris Plains NJ USAANM Varshavsky; AlexanderAACI East HanoverAAST NJAACO USAAGP Varshavsky; Alexander East Hanover NJ US - Remote assistance is provided to a mobile device across a network to enable malware detection. The mobile device transmits potentially infected memory pages to a remote server across a network. The remote server performs analysis, and provides feedback to the mobile device. Based on the received feedback, the mobile device halts a process, or retrieves and transmits additional memory pages to the remote server for more analysis. This process is repeated until a compromised region of memory is identified and/or isolated for further repair to be performed. The feedback from the remote server reduces the processing and storage burden on the mobile device, resulting in a more reliable detection that uses fewer resources. Embodiments including hypervisors and virtual machines are disclosed. | 01-17-2013 |
20140098141 | Method and Apparatus for Securing Input of Information via Software Keyboards - Data entry using a software keyboard such as a touchscreen keyboard is secured by varying key sizes in the keyboard from key to key and from software keyboard configuration to software keyboard configuration, decoupling display locations from keys. Multiple software keyboard configurations are generated, each having different sets of key sizes. The keyboard configuration may be changed with each keystroke, or may be changed for each prompted entry including multiple keystrokes. | 04-10-2014 |
20140289835 | Devices, Systems and Methods for Security Using Magnetic Field Based Identification - Devices, systems and methods are disclosed for determining an electromagnetic signature for authenticating a device, a user, and/or a location. In exemplary embodiments, a magnetometer captures an electromagnetic signature which is then compared with one or more authorized electromagnetic signatures. If the electromagnetic signature matches an authorized electromagnetic signature, then access is granted. The magnetometer is integrated into a communication device having a processor and a logic. The magnetometer captures an electromagnetic signature of a surrounding environment and detects motion of the communication device through the captured electromagnetic signature. The logic on the communication device locks or unlocks features of the device based upon the captured electromagnetic signature. In further embodiments of the subject disclosure, the magnetometer is in communication with a server which authenticates a user or communication device to provide access to a remote location. | 09-25-2014 |
Patent application number | Description | Published |
20120150656 | Integration of Reserved and Dynamic Advertisement Allocations - Systems, methods, and computer media for integrating requests for reserved allocations of advertisement impressions and requests for dynamic allocations of advertisement impressions are provided. A request is received from a first advertiser to purchase a reserved allocation of advertisement impressions. The request specifies a requested number of impressions that each have one or more requested attributes. One or more bids to dynamically purchase one or more impressions through a real-time bidding process are received from an external bidding agent. An internal bidding agent bids, on behalf of the first advertiser, to dynamically purchase one or more impressions through the real-time bidding process until the request from the first advertiser to purchase the reserved allocation of impressions is satisfied. | 06-14-2012 |
20120158476 | Social Marketing Manager - A social marketing manager may facilitate marketing campaigns in online social networks by creating and monitoring campaigns, as well as facilitating online social interactions. A campaign manager may create a campaign and define various operational parameters. A recruitment system may identify social influencers through which the campaign may be started, and a promotion manager may create and track objects that may be passed to participants in the campaign. An analysis and monitoring system may determine the overall effectiveness of the campaign and provide feedback, payments to participants, or other results of the campaign. | 06-21-2012 |
20120158477 | SOCIAL INCENTIVES PLATFORM - A social incentive system is described herein that formalizes information propagation through social networks in a structured and systematic way. The system provides incentives and rewards to entities who participate in propagating the information, allowing heavy influencers to gain from their influence while the marketer rewards them. The system provides one or more tools for creation and design of social incentive plans with rewards for socially distributing information, including marketing campaigns. In particular, the system introduces a semantic framework where marketers can create structured incentive plans for rewarding consumers and distribution platforms for distributing information through social networks. As users complete specified activities they earn points, and the points can be redeemed for various incentives, such as cash, debit cards, prizes, merchandise, subscriptions, and so forth. The framework is robustly designed to avoid abuse and allow for fraud detection. | 06-21-2012 |
20120209674 | SOCIAL MARKETING INCENTIVES AND REWARDS - A social marketing system may reward and incentivize participants, and may also have a fraud detection system. The manager may create social marketing campaigns that may be simulated to determine an expected set of activities, which may be compared to an actual set of activities. A fraud detection system may detect abnormal activity and may bring the activity to a manager's attention and may also punish the participants by withholding rewards, lowering the participant's reputation, or some other punishment mechanism. | 08-16-2012 |
20120209832 | SOCIAL NETWORK BASED CONTEXTUAL RANKING - A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's reputation may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks. | 08-16-2012 |
20120209920 | SOCIAL INFLUENCERS DISCOVERY - Social influencers may be identified for specific usage contexts and for influencer type. Influencers may be categorized by mavens, connectors, salesmen, or other categories. Within each usage context, a unified data model may be used to collect data from multiple sources, including multiple social networks, as well as to collect data from different levels of influencers in each usage context. The relevance of various communication media as well as the frequency and quality of use of the media may be factors used to determine a person's effectiveness as a specific type of influencer within a usage context. | 08-16-2012 |
20120210240 | USER INTERFACES FOR PERSONALIZED RECOMMENDATIONS - A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's expertise may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks. | 08-16-2012 |
20120238285 | Wireless Identifiers for Proximity Applications - A proximity matching system may use broadcast wireless identifiers transmitted by users' devices to match users with other nearby users. The identifiers may be collected by a plurality of agents, then the identifiers may be matched with pre-defined profiles to generate physically proximate users by a remote service. The group of proximate users may be provided to various applications and consumed with summarized properties or individual properties, depending on the approved privacy settings as selected by the users. In some embodiments, the broadcast wireless identifiers may be personal area network identifiers, local area network identifiers, cellular network identifiers, or other broadcast identifier. In some embodiments, the agents may not establish a peer to peer or other connection with the broadcasting device. The agents may be fixed or mobile agents, and the proximity of users may be generated through links between nearby agents in a meshed fashion. | 09-20-2012 |
20130073378 | SOCIAL MEDIA CAMPAIGN METRICS - A social marketing system may measure the performance of marketing campaigns using the effective click through rates that include impressions that are due to propagation of items through social networks. A social marketing system may track an initial effectiveness in starting a campaign, as well as track the propagation of the campaign information through multiple social networks. The effectiveness of the campaign may be measured using the effective click through rates for various target audiences. The social marketing system may create links to advertising materials and thereby track interactions when users click through the links to interact with the materials. The effectiveness of the social media campaign may be based in part by measuring the actual or estimated number of impressions through social media networks. | 03-21-2013 |
20130085838 | INCENTIVE OPTIMIZATION FOR SOCIAL MEDIA MARKETING CAMPAIGNS - A social marketing system may have an incentive system that may be optimized dynamically for each user during the course of a marketing campaign. The social marketing system may use a simulated model of social interactions to predict the performance of a marketing campaign and may use the output of the simulation to adjust incentives during a campaign for various users, as well as use the actual results of changes in incentives as feedback to the simulation. The simulation may assume several different types of users within the social network and that several types of financial and non-financial incentives may be applied to different users. Some embodiments may use machine learning algorithms to analyze actual results and feed those results into the simulation. The system may be able to categorize users into the simulated types and adjust incentives according to the models associated with those types of users. | 04-04-2013 |