Patent application number | Description | Published |
20080209210 | MASTER KEY TRUST GRANTS AND REVOCATIONS FOR MINOR KEYS - A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key. | 08-28-2008 |
20090168667 | TIME BASED ACCESS PROVISIONING SYSTEM AND PROCESS - A method and apparatus is provided for the time-based provisioning of wireless devices. A network access point monitors operation of wireless devices within a service region. When provisioning logic is activated at the network access point, the access point determines if the tracked parameter (such as power on or the onset of signal transmission) of the wireless device occurs within a designated time interval from the time of the provisioning activation. If the tracked device qualifies, the network access point proceeds with provisioning the device. In one system embodiment, the network access point tracks the power on time of wireless devices. When a wireless device to be authorized is powered on, the provisioning logic at the network access point notes the power on time. The user then activates the provisioning access at the network access point, and the network access point provisions the wireless device if it is recently powered on. | 07-02-2009 |
20090199271 | IMPLICIT POPULATION OF ACCESS CONTROL LISTS - Communication applications may include lists of users with which a user of the application communicates. If two users of a communications application each include the other user on their user lists, an implicit trust may be established between the users. For example, if user A includes user B in her list and user B includes user A in his list, then it may be determined that each user knows and/or trusts the other user. As a result, a connection or communications pathway may be automatically created between the client devices of the users to facilitate communications between the users based on the implicit trust. | 08-06-2009 |
20090248816 | Passive Personalization of Buddy Lists - Personalizing communications for a first communication platform includes accessing status information for communication sessions by a communication identity that leverage a first communication platform other than an instant messaging platform. A participant list associated with the communication identity and the first communication platform is passively configured to persistently reflect a list of participant identities from communication sessions in which the communication identity recently participated using the communication platform. | 10-01-2009 |
20100142005 | VISUAL CRYPTOGRAPHY AND VOTING TECHNOLOGY - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 06-10-2010 |
20100176949 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 07-15-2010 |
20100332562 | Location-Based Services - In some embodiments, a technique for providing location-based functionality comprises providing functionality, wherein the functionality uses information provided by a location-aware device. | 12-30-2010 |
20110078765 | SYSTEM AND METHOD FOR ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords. | 03-31-2011 |
20110225652 | IDENTITY THEFT COUNTERMEASURES - In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing. | 09-15-2011 |
20110279471 | Visual Cryptography and Voting Technology - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 11-17-2011 |
20120144472 | Fraud Detection - In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication attempt; determining whether the authentication credential is related to a valid account; and performing a security measure related to the valid account, if it is determined that the authentication credential is related to the valid account. | 06-07-2012 |
20120178478 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 07-12-2012 |
20120222105 | SYSTEM AND METHOD FOR ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords. | 08-30-2012 |
20120226761 | Updating an Entry in an Addressee-Based Whitelist - In some embodiments, techniques may include receiving an email message; determining a non-recipient email addressee associated with the email message, wherein the non-recipient email addressee has an address that is unaffiliated with a recipient for which the email message has been received; receiving a directive to whitelist the non-recipient email addressee; and responsive to receiving the directive to whitelist the non-recipient email addressee, adding the non-recipient email addressee to a whitelist. | 09-06-2012 |
20120226763 | INTELLIGENT PROCESSING IN THE CONTEXT OF AWAY AND OFFLINE INSTANT MESSAGES - An electronic assistant handles instant messages sent to a user when the user is away or offline. The electronic assistant may respond intelligently and helpfully to inquiries regarding the user's away or offline status, may take messages for delivery to the away or offline user, and may intelligently forward messages to the user, as appropriate. | 09-06-2012 |
20120246469 | MASTER KEY TRUST GRANTS AND REVOCATIONS FOR MINOR KEYS - A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key. | 09-27-2012 |
20120284799 | VISUAL CRYPTOGRAPHY AND VOTING TECHNOLOGY - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 11-08-2012 |
20130067221 | MASTER KEY TRUST GRANTS AND REVOCATIONS FOR MINOR KEYS - A method and apparatus is provided that allows code signed by a master key to grant trust to an arbitrary second key, and also allows code, referred to as an antidote and also signed by the master key to revoke permanently the trust given to the second key. | 03-14-2013 |
20130080551 | Passive Personalization of Buddy Lists - Personalizing communications for a first communication platform includes accessing status information for communication sessions by a communication identity that leverage a first communication platform other than an instant messaging platform. A participant list associated with the communication identity and the first communication platform is passively configured to persistently reflect a list of participant identities from communication sessions in which the communication identity recently participated using the communication platform. | 03-28-2013 |
20130243188 | DATA PRIVACY - In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques for data security may include distributing an encrypted private key. In some embodiments, unreadable data may be encrypted and/or decrypted using time-varying keys. | 09-19-2013 |
20130316743 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 11-28-2013 |
20140041008 | ESTABLISHING HISTORICAL USAGE-BASED HARDWARE TRUST - Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords. | 02-06-2014 |
20140164610 | SELF-FORMING NETWORK - A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network. | 06-12-2014 |
20140201835 | IDENTITY THEFT COUNTERMEASURES - In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing. | 07-17-2014 |
20140269359 | REDUCTION OF RETRANSMISSION LATENCY BY COMBINING PACING AND FORWARD ERROR CORRECTION - A computer-implemented method for reducing retransmission latency, including steps for determining a packet transmission interval for a plurality of data packets, determining redundant error correction information for the plurality of packets and pacing a transmission of the plurality of packets to a recipient, wherein each of the plurality of packets is separated in time based on the packet transmission interval. In certain aspects, the method further includes steps for transmitting the redundant error correction information to the recipient once each of the plurality of packets has been transmitted. Systems and computer-readable media are also provided. | 09-18-2014 |
20150026063 | TIME-VARYING SECURITY CODE FOR ENABLING AUTHORIZATIONS AND OTHER USES OF FINANCIAL ACCOUNTS - A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device. | 01-22-2015 |
20150065168 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 03-05-2015 |