Patent application number | Description | Published |
20080289013 | TECHNIQUES FOR LOCAL PERSONALIZATION OF CONTENT - Techniques for the local personalization of content are presented. A content personalization service is dynamically pushed from a server environment to a client processing environment associated with a principal on demand. The content personalization service interjects itself between content that the principal attempts to view and access within the client processing environment and modifies and personalizes that content on behalf of the principal before the principal can view or access the content. | 11-20-2008 |
20080289049 | TECHNIQUES FOR PERSONALIZING CONTENT - Techniques for personalizing content are presented. A principal requests access to content. Policy is evaluated in response to the request for the content. Scripts are processed in response to the policy evaluation to rewrite and modify the content. The modified content is then delivered to the requesting principal to personalize the content for the principal. | 11-20-2008 |
20080313348 | TECHNIQUES FOR PORT HOPPING - Techniques for port hopping are presented. A sender and a receiver engage in a communication session with one another and dynamically switch ports during that communication session. A decision to switch ports is based on a data length or packet count of a given transaction occurring during the communication session. The data length and packet count randomly and dynamically change during the communication session and varies from one transaction to another transaction. Any particular port to switch to during the communication session is also randomly and dynamically generated and varies from one transaction to another transaction. | 12-18-2008 |
20090150677 | TECHNIQUES FOR REAL-TIME ADAPTIVE PASSWORD POLICIES - Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern. | 06-11-2009 |
20090150971 | TECHNIQUES FOR DYNAMIC GENERATION AND MANAGEMENT OF PASSWORD DICTIONARIES - Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable. | 06-11-2009 |
20090171953 | TECHNIQUES FOR RECOGNIZING MULTIPLE PATTERNS WITHIN A STRING - Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed. | 07-02-2009 |
20090172788 | TECHNIQUES FOR CREDENTIAL STRENGTH ANALYSIS VIA FAILED INTRUDER ACCESS ATTEMPTS - Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation. | 07-02-2009 |
20120042355 | REPRESENTING EXTENSIBLE MARKUP LANGUAGE (XML) AS AN EXECUTABLE HAVING CONDITIONAL AUTHENTICATION OR POLICY LOGIC - Techniques for representing extensible markup language (XML) in an executable format are presented. An XML document is parsed into its components and content. The components and content are packaged as an executable. Some portions of the executable include authentication logic or policy logic that is subsequently enforced when the executable is processed. The executable is subsequently distributed to recipient machines. The machines process the executable and produce memory loaded versions of the components and content representing the XML document on the machines. The memory loaded versions of the components and content include conditionally added authentication logic of policy logic. | 02-16-2012 |
20140189826 | TECHNIQUES FOR DYNAMIC GENERATION AND MANAGEMENT OF PASSWORD DICTIONARIES - Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable. | 07-03-2014 |
20150242607 | ANONYMOUS AUTHENTICATION USING BACKUP BIOMETRIC INFORMATION - A method for performing anonymous authentication by an electronic device is described. The method includes obtaining biometric data. The method also includes enrolling biometric information based on the biometric data. The method also includes generating backup biometric information based on the biometric data. The backup biometric information includes a backup biometric template. The method also includes generating a backup public key and a backup private key. The method also includes enrolling the backup biometric information. Enrolling the backup biometric information includes distributing the backup biometric template, the backup public key and the backup private key among different entities. | 08-27-2015 |
Patent application number | Description | Published |
20130119050 | APPARATUS, SYSTEM, AND METHOD FOR AMMUNITION CARTRIDGE CASE ANNEALING - An apparatus, system, and method are disclosed for annealing an ammunition cartridge that include an inductive coil, the inductive coil substantially encompassing the sides of an annealing chamber, the inductive coil including a first portion comprising a first diameter and a second portion comprising a second diameter, wherein the first diameter is larger than the second diameter. Apparatus, system and method may also include an insert, the insert encompassing the sides of the annealing chamber, and a cartridge case that is unevenly heated such that the cartridge case obtains at least a first hardness at a first location and a second hardness at a second location, the first hardness different from the second hardness. | 05-16-2013 |
20130180392 | APPARATUS, SYSTEM, AND METHOD FOR MANUFACTURING AMMUNITION CARTRIDGE CASES - The present disclosure relates to a system for forming a cartridge case, the system including a series of stages, each stage comprising a sequential location in the system, and each stage comprising a process step, wherein each process step is synchronized to occur within a substantially simultaneous stage interval, the stages including: an annealing stage, a head forming stage, and a taper stage. The present disclosure also relates to a method for manufacturing a cartridge case, the method including: receiving a single cartridge case at a time in a first direction into an annealing chamber through a first opening, passing an alternating current through an inductive coil for a certain time period to heat the cartridge case, releasing the cartridge case from the annealing chamber in the first direction through a second opening, and performing a forming step on the cartridge case. | 07-18-2013 |
Patent application number | Description | Published |
20140052678 | HIERARCHICAL BASED SEQUENCING MACHINE LEARNING MODEL - A hierarchical based sequencing (HBS) machine learning model. In one example embodiment, a method of employing an HBS machine learning model to predict multiple interdependent output components of an MOD output decision may include determining an order for multiple interdependent output components of an MOD output decision. The method may also include sequentially training a classifier for each component in the selected order to predict the component based on an input and based on any previous predicted component(s). | 02-20-2014 |
20140279739 | RESOLVING AND MERGING DUPLICATE RECORDS USING MACHINE LEARNING - According to various embodiments of the present invention, an automated technique is implemented for resolving and merging fields accurately and reliably, given a set of duplicated records that represents a same entity. In at least one embodiment, a system is implemented that uses a machine learning (ML) method, to train a model from training data, and to learn from users how to efficiently resolve and merge fields. In at least one embodiment, the method of the present invention builds feature vectors as input for its ML method. In at least one embodiment, the system and method of the present invention apply Hierarchical Based Sequencing (HBS) and/or Multiple Output Relaxation (MOR) models in resolving and merging fields. Training data for the ML method can come from any suitable source or combination of sources. | 09-18-2014 |
20140372344 | Adaptive User Interfaces - According to various embodiments, user performance and/or motivation for a computing system may be maximized by optimizing one or more target components of a user interface of the computing system. The target components may be aspects of the user interface that is perceived by the user. One or more input features and one or more output features may be identified, and data regarding these input and output features may be gathered. This data may be compared with the results generated by a set of candidate artificial intelligence algorithms to determine which of them provides the best fit with the data collected. Then, the selected artificial intelligence algorithm may be applied to the user interface to iteratively change the target components over time until the optimal settings for each user are discovered. | 12-18-2014 |
20150161507 | HIERARCHICAL BASED SEQUENCING MACHINE LEARNING MODEL - A hierarchical based sequencing (HBS) machine learning model. In one example embodiment, a method includes employing a machine learning model to predict multiple interdependent output components of an MOD output decision. | 06-11-2015 |