Patent application number | Description | Published |
20150089593 | METHOD AND SYSTEM FOR USING A VIBRATION SIGNATURE AS AN AUTHENTICATION KEY - A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network. | 03-26-2015 |
20150098308 | METHOD AND SYSTEM USING VIBRATION SIGNATURES FOR PAIRING MASTER AND SLAVE COMPUTING DEVICES - A method and a system of using vibration signatures for pairing two devices. The method and the system include an apparatus that has a master side and a slave side. The slave side has at least one frictional structure. A first device is inserted into the master side. When a second device is inserted through the slave side, a pattern of vibration is generated. Vibration detecting devices on the first and second devices detect the pattern of vibration. A program of the first device validates a master vibration signature and configures the first device as a master device. A program of the second device validates a slave vibration signature and configures the second device as a slave device. The master device and the slave device are automatically paired. | 04-09-2015 |
20150281230 | METHOD AND SYSTEM FOR USING A VIBRATION SIGNATURE AS AN AUTHENTICATION KEY - A method and computer program product for using a vibration signature as an authentication key to authorize access of a user computer to a network. A vibration device generates a vibration signal of the vibration signature. In one embodiment, a router detects and validates the vibration signal, and then the router starts a session of connecting the user computer to the network. In another embodiment, the user computer decodes the vibration signal of the vibration signature to a security set identifier and a security key, and then sends to a router. In response to validating the security set identifier and the security key, the router starts a session of connecting the user computer to the network. | 10-01-2015 |
20150326610 | CONNECTION CONFIGURATION - A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules. | 11-12-2015 |
20160006694 | CONNECTION CONFIGURATION - A connection method is provided. The method includes retrieving by a data retrieval device, unique data comprising an identifier associated with a wireless device. The unique data is transmitted to a router transmitting an authorization request and a configuration request for a configuration change to an authorization service. The authorization request is presented to a user and in response the user transmits an authorization code to the authorization service. In response, the router generates a virtual SSID and preconfigured firewall rules based on the unique data and the wireless device is automatically connected to the router based on the virtual SSID and the preconfigured firewall rules. | 01-07-2016 |
Patent application number | Description | Published |
20090077617 | Automated generation of spam-detection rules using optical character recognition and identifications of common features - In a spam detection method and system, optical character recognition (OCR) techniques are applied to a set of images that have been identified as being spam. The images may be provided as the initial training of the spam detection system, but the preferred embodiment is one in which the images are provided for the purpose of updating the spam-detection rules of currently running systems at different locations. The OCR generates text strings representative of content of the individual images. Automated techniques are applied to the text strings to identify common features or patterns, such as misspellings which are either intentionally included in order to avoid detection or introduced through OCR errors due to the text being obscured. Spam-detection rules are automatically generated on the basis of identifications of the common features. Then, the spam-detection rules are applied to electronic communications, such as electronic mail, so as to detect occurrences of spam within the electronic communications. | 03-19-2009 |
20090083413 | Distributed frequency data collection via DNS - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 03-26-2009 |
20100049848 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA INDICATOR EMBEDDED WITH DNS REQUEST - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 02-25-2010 |
20100049985 | DISTRIBUTED FREQUENCY DATA COLLECTION VIA DNS NETWORKING - Domain Name Service (DNS) requests are used as the reporting vehicle for ensuring that security-related information can be transferred from a network. As one possibility, a central facility for a security provider may maintain a data collection capability that is based upon receiving the DNS requests containing the information being reported. In an email application, if a data block is embedded within or attached to an email message, an algorithm is applied to the data block to generate an indicator that is specifically related to the contents of the data block. As one possibility, the algorithm may generate a hash that provides a “digital fingerprint” having a reasonable likelihood that the hash is unique to the data block. By embedding the hash within a DNS request, the request becomes a report that the data block has been accessed. | 02-25-2010 |
Patent application number | Description | Published |
20120291012 | MANAGING A WORKING SET IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - Files supporting a development activity in an IDE are previewed and are not added to a collection of files in a working set for the development activity. A previewed file is represented by a single preview tab displayed on the user interface. The content of a previewed file can be displayed in a preview display portion of a user interface. The preview tab can be stylistically distinct from a durable tab and can identify the current previewed file. A previewed file can be promoted to a durable file. A promoted previewed file is added to the working set for the development activity. | 11-15-2012 |
20130007671 | MULTI-FACETED RELATIONSHIP HUBS - Multi-faceted relationship hubs can support browsing an extensible set of relationship types from within a single tool window. A user can switch between relationship types within a single tool window without disrupting user flow by having to change context in a plurality of tool windows. Multiple instances of relationship hubs can be created. Browsing navigation history can be stored, allowing a user to maintain and reacquire relationship contexts. A user can preview the content of one or more files without opening the file. | 01-03-2013 |
20140282377 | CASCADING INLINE DISPLAY AND PREVIEW OF RELATED INFORMATION FOR ELEMENTS IN A DOCUMENT - Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information related to an identifier in the code they are developing. An inline viewport is presented to the user in response to the user selecting an identifier in the code whereby the user is able to see relevant information related to the identifier in a spatially consistent location with the code they are investigating. The developer further has the ability to cascade the viewports such that multiple levels of depth of relationships can be viewed in the viewport. | 09-18-2014 |
20140282378 | INLINE DISPLAY AND PREVIEW OF RELATED INFORMATION FOR ELEMENTS IN A DOCUMENT - Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information related to an identifier in the code they are developing. An inline viewport is presented to the user in response to the user selecting an identifier in the code whereby the user is able to see relevant information related to the identifier in a spatially consistent location with the code they are investigating. Further, the developer has the ability to make changes to the code in the viewport without leaving the current editor. | 09-18-2014 |
20140282387 | INLINE DISPLAY AND PREVIEW OF RELATED INFORMATION FOR ELEMENTS IN A DOCUMENT - Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information related to an identifier in the code they are developing. An inline viewport is presented to the user in response to the user selecting an identifier in the code whereby the user is able to see relevant information related to the identifier in a spatially consistent location with the code they are investigating. Further, the developer has the ability to make changes to the code in the viewport without leaving the current editor. | 09-18-2014 |
20160004421 | CASCADING INLINE DISPLAY AND PREVIEW OF RELATED INFORMATION FOR ELEMENTS IN A DOCUMENT - Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information related to an identifier in the code they are developing. An inline viewport is presented to the user in response to the user selecting an identifier in the code whereby the user is able to see relevant information related to the identifier in a spatially consistent location with the code they are investigating. The developer further has the ability to cascade the viewports such that multiple levels of depth of relationships can be viewed in the viewport. | 01-07-2016 |
20160070422 | INLINE DISPLAY AND PREVIEW OF RELATED INFORMATION FOR ELEMENTS IN A DOCUMENT - Disclosed herein is a system and method for optimizing a developer's ability to find and navigate relevant documents, relationships, and other information related to an identifier in the code they are developing. An inline viewport is presented to the user in response to the user selecting an identifier in the code whereby the user is able to see relevant information related to the identifier in a spatially consistent location with the code they are investigating. Further, the developer has the ability to make changes to the code in the viewport without leaving the current editor. | 03-10-2016 |