Patent application number | Description | Published |
20100102287 | LIFTING GEAR - The invention relates to lifting gear having a drive unit ( | 04-29-2010 |
20120256145 | LIFTING APPARATUS, ESPECIALLY CABLE TRACTION MECHANISM, COMPRISING CONNECTING POSSIBILITIES - A lifting apparatus, especially a cable traction mechanism, comprising a base frame that has at least two base plates, further comprising at least two longitudinal beams that interconnect the base plates and are spaced apart from each other, and at least one attachable cross-member for cable reeving parts that is fastened to the base plates and extends substantially parallel to the longitudinal beams. Multiple mounting points, to which the attachable cross-member for cable reeving parts can be alternatively and detachably fastened, may be arranged on each of the base plates to promote modularity of the lifting apparatus. | 10-11-2012 |
20120267592 | BASE FRAME FOR A LIFTING APPARATUS, ESPECIALLY A CABLE TRACTION MECHANISM, AND METHOD FOR MOUNTING, DISMOUNTING, OR MODIFYING THE SAME - A lifting apparatus, especially a cable traction mechanism, comprising a base frame that has at least two base plates, further comprising at least two longitudinal beams which have a first end and an opposite second end and which interconnect the base plates and keep the same apart from each other. The lifting apparatus, especially a cable traction mechanism, comprises a simple design and can readily be mounted, dismounted, or modified by detachably fastening the first end and the second end of the longitudinal beams to the base plates in such a way in an operational state of the lifting apparatus and designing one of the at least two base plates in such a way that the longitudinal beams can be inserted or removed in the direction of the longitudinal axis thereof when mounting, dismounting, or modifying the base frame. | 10-25-2012 |
20120280190 | BASE FRAME FOR A LIFTING APPARATUS, ESPECIALLY A CABLE TRACTION MECHANISM, COMPRISING CONNECTING POSSIBILITIES - A lifting apparatus, especially a cable traction mechanism, comprises a base frame that has at least two base plates and at least two longitudinal beams that interconnect the base plates and are spaced apart from each other. Attachment elements are mounted on the base plates by means of holding parts. The lifting apparatus, especially a cable traction mechanism, is characterized by a modular design, where the holding parts are arranged as extensions of the longitudinal beams. | 11-08-2012 |
Patent application number | Description | Published |
20100023782 | CRYPTOGRAPHIC KEY-TO-POLICY ASSOCIATION AND ENFORCEMENT FOR SECURE KEY-MANAGEMENT AND POLICY EXECUTION - Key-to-policy association and hardware-based policy enforcement for file/folder encryption (FFE) and/or full-disk encryption (FDE) are provided. A CPU independent microprocessor (CIM) is coupled to a platform and provides a secure storage service, secure non-volatile storage, secure policy enforcement engine, and system interface for communication with platform components independent of the CPU. The CIM stores a key and its associated policies by generating a hardware-derived key to wrap the key prior to securely storing it in non-volatile storage on the CIM. Upon receiving a request for key-access by an application, policy status and credentials are verified before the key is returned. | 01-28-2010 |
20120255026 | METHOD AND DEVICE FOR MANAGING DIGITAL USAGE RIGHTS OF DOCUMENTS - A method, device, and system for managing digital usage rights of documents includes a mobile computing device having a digital rights management (DRM) enforcement engine included therein. The mobile computing device may communicate with a server, such as an enterprise digital rights management (EDRM) server, to retrieve a secured document and an associated document usage rights policy. The document and usage rights policy are stored in a secured storage of the mobile computing device. The DRM enforcement engine of the mobile computing device provides access to the requested document while locally enforcing the associated document usage rights policy. In some embodiments, the mobile computing device may act as a proxy for other computing devices communicatively coupled to the mobile computing device and/or act as a local EDRM to such computing devices. | 10-04-2012 |
20130324166 | METHOD AND APPARATUS USING GEOFENCE TO TRACK INDIVIDUAL GROUP MEMBERS - A method is provided to track geolocations of multiple mobile location tracking enabled devices, each such device associated with at least one member of a group of subjects; one of the devices sends a map image of a real-world location and indicia of geofence to each of the other devices; each of multiple devices sends its geolocation to at least one other device in the group; the at least one device in the group displays the respective geolocations of the other devices relative to the map image and relative to the geofence image; an alert is generated by the at least one other device in the group in response to a determination that at least one of the devices in the group is disposed outside the geofence or within a prescribed distance from the geofence. | 12-05-2013 |
20140012917 | SHARING USER INFORMATION WITH PROXIMATE DEVICES - Embodiments of techniques and systems for sharing user information between proximate devices are described. In embodiments, a first device may identify a physically-proximate device that may receive user information. Upon receiving an indication that a user of the first device may desire to share user information with a user of the second device, a determination may be made as to whether the two users have matching interests. In embodiments, the interest match determination may be made by a separate interest match evaluator. Upon determination of an interest match, the first device may then send a request to share user information to the second device. If a user of the second device approves the request, user information for the user of the first device may be shared with the user of the second device. Other embodiments may be described and claimed. | 01-09-2014 |
20140025601 | SYSTEM AND METHOD FOR IDENTIFYING REVIEWERS WITH INCENTIVES - A system and method includes obtaining reviews from an electronic commerce site, generating statistics via a specifically programmed machine regarding the reviews by reviewers, identifying reviewers via the machine having statistics indicative of a compensated reviewer, generating scores via the machine for the reviewers indicative of a probability that each reviewer is a compensated reviewer. The method may further or alternatively include monitoring user interactions via a specifically programmed machine with electronic commerce generated content with respect to reviews of products, and providing a reviewer score via the machine responsive to such user interactions, wherein the score is representative of the probability that a reviewer generating the score is compensated with respect to providing reviews. | 01-23-2014 |
20140088856 | LOCATION METADATA BASED ON PEOPLE VISITING THE LOCATIONS - Methods and systems for a location metadata system are disclosed. A data storage subsystem stores collected data associated with locations and users. A network interface is coupled to the data storage subsystem. The network interface manages communication with devices of users to collect data associated with the locations and users. A data analysis system includes a processor adapted for obtaining the collected data from the data storage subsystem and for analyzing the collected data to create a first location identity associated with interaction of users with a first location. | 03-27-2014 |
20140091900 | PROVIDING LIMITED ACCESS TO A SERVICE DEVICE VIA AN INTERMEDIARY - Systems and methods may provide for brokering limited access to a service device via an intermediary. In one example, the method may include receiving a request communication at a control device including a request for limited access to a service device, wherein the request is received from an intermediary device on behalf of a request device, and transmitting an access communication to the intermediary device, wherein the access communication includes an access ticket to be used by the request device to gain the limited access of the service device. | 04-03-2014 |
20140091903 | MOBILE DEVICE AND KEY FOB PAIRING FOR MULTI-FACTOR SECURITY - Systems and methods may provide for determining a first proximity status of a first mobile device with respect to a vehicle, and determining a second proximity status of a second mobile device with respect to the vehicle. Additionally, an accessibility of one or more functions of the vehicle may be configured based at least in part on the first proximity status and the second proximity status. In one example, a policy associated with one or more of the first mobile device and the second mobile device may be identified, wherein the accessibility is configured further based on the policy. | 04-03-2014 |
20140096177 | FACILITATING VARIED ACCESS BASED ON AUTHENTICATION SCORING - Systems and methods may provide for determining a composite false match rate for a plurality of authentication factors in a client device environment. Additionally, the composite false match rate can be mapped to a score, wherein an attestation message is generated based on the score. In one example, the score is associated with one or more of a standardized range and a standardized level. | 04-03-2014 |
20140096178 | ALLOWING VARIED DEVICE ACCESS BASED ON DIFFERENT LEVELS OF UNLOCKING MECHANISMS - Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may be conducted based on the associated security policy. In one example, one or more cryptographic keys are used to place the device in an unlocked state with regard to the selected level of access if the authentication is successful. If the authentication is unsuccessful, on the other hand, the device may be maintained in a locked state with regard to the selected level of access. | 04-03-2014 |
20140189356 | METHOD OF RESTRICTING CORPORATE DIGITAL INFORMATION WITHIN CORPORATE BOUNDARY - A method of enforcing a virtual corporate boundary may include a client device requesting sensitive content from a network site on a server device responsive to a user's interaction with the client device. The server device can determine whether the user and/or client device are permitted to access the sensitive content. A secure element on the client device can establish a session key between the server device and the client device. The server device can render the sensitive content and send it to the client device, which can display the content to the user. | 07-03-2014 |
20140259130 | SECURITY CHALLENGE ASSISTED PASSWORD PROXY - Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device. | 09-11-2014 |
20140282832 | METHOD, APPARATUS, SYSTEM, AND COMPUTER READABLE MEDIUM FOR PROVIDING APPARATUS SECURITY - Technologies are provided in embodiments for receiving policy information associated with at least one security exception, the security exception relating to execution of at least one program, determining an operation associated with the security exception based, at least in part, on the policy information, and causing the operation to be performed, based at least in part, on a determination that the at least one security exception occurred. | 09-18-2014 |
20140337279 | MANAGEMENT OF COLLABORATIVE TEAMS - Systems and methods for dynamically creating collaborative teams and managing collaborative work of a team are generally disclosed herein. One example embodiment includes the dynamic creation of a collaborative team by creating an association between team members via a managing module. The managing module may be capable of managing, among other things, team members on a team, tasks and goals of each member of the team, as well as documentation associated with the team. In some embodiments, the managing module may use a chat or messaging protocol to manage collaborative modifications to documents of the team. | 11-13-2014 |
20150058017 | COLLABORATIVE AUDIO CONVERSATION ATTESTATION - Disclosed in some examples are systems, methods, devices, and machine readable mediums which may produce an audio recording with included verification from the individuals in the recording that the recording is accurate. In some examples, the system may also provide rights management control to those individuals. This may ensure that individuals participating in audio events that are to be recorded are assured that their words are not changed, taken out of context, or otherwise altered and that they retain control over the use of their words even after the physical file has left their control. | 02-26-2015 |
Patent application number | Description | Published |
20080235769 | SYSTEM AND METHOD FOR ADAPTIVE TARPITS USING DISTRIBUTED VIRTUAL MACHINES - A system and method for adaptive tarpits using distributed virtual machines. A method in an embodiment may include determining an intrusion prevention strategy in response to a potential attack on a network. Then, based on the intrusion prevention strategy, allocating at least one virtual tarpit in the network, where the at least one virtual tarpit is implemented as a virtual machine, and the adapting the at least one virtual tarpit in the network includes one or more of suspending a virtual tarpit, resuming a suspended virtual tarpit and migrating a virtual tarpit to another virtual machine in the network. Other embodiments are described and claimed. | 09-25-2008 |
20110078758 | METHOD AND DEVICE FOR CONTROLLING USE OF CONTEXT INFORMATION OF A USER - A method and device for controlling use of context information of a user includes establishing a context policy enforcement engine on a mobile computing device. The context policy enforcement engine may be embodied as software and/or hardware components. The context policy enforcement engine retrieves context policy data in response to receiving a request for context information related to a user. The context policy data defines a set of context rules for responding to context requests. The context policy enforcement engine responds to the request based on the set of context rules. | 03-31-2011 |
20110148633 | USING TRAJECTORY FOR AUTHENTICATION - An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior. | 06-23-2011 |
20110161848 | METHOD AND DEVICE FOR MANAGING SECURITY EVENTS - A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and/or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy. | 06-30-2011 |
20120174214 | ENHANCING BIOMETRIC SECURITY OF A SYSTEM - In one embodiment, a method includes receiving an ordered sequence of biometric inputs from a user via a biometric sensor, determining if each of the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user, and if so, enabling the user to access the processing system, otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed. | 07-05-2012 |
20120311695 | METHOD AND APPARATUS FOR DYNAMIC MODIFICATION OF AUTHENTICATION REQUIREMENTS OF A PROCESSING SYSTEM - Authentication requirements for a user to access a processing system may be dynamically modified based on status information received from sensors coupled to the processing system. The processing system may receive a request for access to the processing system by the user. The processing system determines an authentication policy based at least in part on the status information, and presents authentication requirements to the user based at least in part on the authentication policy. | 12-06-2012 |
20140004834 | SYSTEM AND METHOD FOR GESTURE-BASED MANAGEMENT | 01-02-2014 |
20140006219 | COUNTEROFFER GENERATION SERVICE | 01-02-2014 |
20140006588 | CONTEXT-DRIVEN LOCAL NETWORK SERVICES | 01-02-2014 |
20140089863 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR GESTURE-BASED SEARCH AND DISCOVERY THROUGH A TOUCHSCREEN INTERFACE - A touchscreen-based user interface that allows the user to perform information searching on a mobile information appliance, such as a tablet computer or smart phone. By moving one or two fingers in appropriate direction(s) across the touchscreen, a search may be specified. Moreover, by using the appropriate gestures, a search may be broadened or narrowed by specifying additional search terms. This may be performed iteratively to allow the user to discover information, at various times narrowing or broadening a search. | 03-27-2014 |
20140090008 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 03-27-2014 |
20140090009 | SECURE DATA CONTAINER FOR WEB APPLICATIONS - Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a determination may be made as to whether to permit the attempt based on a context-based security policy. In one example, the context-based security policy is obtained from one or more of a user profile, a multi-user data source and a cloud service. | 03-27-2014 |
20140090066 | SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS - Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform. | 03-27-2014 |
20140095943 | PREDICTIVE PRECACHING OF DATA BASED ON CONTEXT - A device and method for predictively precaching content on a mobile communication device includes monitoring numerous data sources for contextual data on the activities of the user. The mobile communication device predicts network connectivity outages and affected applications using the contextual data. The mobile communication device notifies the affected applications of the predicted network connectivity outage, and in response the affected applications precache suitable content. The affected applications may employ several precaching strategies in response to the notification, such as downloading content from a remote content server, adjusting content streaming, or adjusting content buffering prior to the predicted network connectivity outage. During the network outage, application service is provided using the precached content. Such precaching may also be accomplished using a local caching proxy server. | 04-03-2014 |
20140134972 | Embedding Service Provider Information In A Wireless Call - In one embodiment, a method includes receiving, in a mobile station of a terminating party, an incoming call and an identifier of a service provider of an initiating party of the incoming call, and displaying information corresponding to the initiating party service provider on a display of the mobile station. Other embodiments are described and claimed. | 05-15-2014 |
20140172828 | PERSONALIZED SEARCH LIBRARY BASED ON CONTINUAL CONCEPT CORRELATION - A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed. | 06-19-2014 |
20140197948 | AUTONOMOUS AGGREGATED SEARCH PLATFORM AND METHODS USING THE SAME - Systems and methods for searching for lost moving objects such as children are disclosed. In some embodiments, the systems and methods initiate an autonomous, expanding electronic search by emitting a search activation signal from a search initiation device. The search activation signal may include the target tag identifier of a target tag conveyed by the moving object. Search devices detecting the target tag may generate a hit signal, which may be used to determine the location of the target tag. In some instances, focused human searching for the moving object may be initiated based on this determined location, and/or on location information included in one or more hit signals. | 07-17-2014 |
20140200025 | LOCATION DISCREPANCY CORRECTIONS BASED ON COMMUNITY CORRECTIONS AND TRAJECTORY DETECTION - Generally, this disclosure describes location discrepancy fixes using a community of users. A method may include correcting a location of a mobile device when a location signal is lost based on a last known location and a trajectory, wherein a corrected location corresponds to an actual location provided by at least one user of a community of users and stored in a list of corrected locations, and the actual location is related to the last known location and the trajectory. | 07-17-2014 |
20140214673 | METHOD FOR AUTHENTICATION USING BIOMETRIC DATA FOR MOBILE DEVICE E-COMMERCE TRANSACTIONS - Generally, this disclosure describes authentication using biometric data for mobile device e-commerce transactions. A method may include capturing a mobile device user's biometric data; comparing the captured biometric data to authorized user biometric data stored on the mobile device; and authenticating an e-commerce transaction if the captured biometric data corresponds to the authorized user biometric data stored on the mobile device. | 07-31-2014 |
20140221003 | PEER-BASED COLLABORATIVE DISCOVERY AND SIGNALING OF ANOTHER DEVICE IN LIMITED-SIGNAL AREAS - Generally, this disclosure describes a method and system for peer-based collaborative discovery and signaling of another device in limited signal areas. A method may include, in an embodiment, initiating a sensing mode in a seek mobile device in response to receiving an indication that a location of a lost mobile device is unknown; capturing first position data if a signal from the lost device is detected; capturing second position data in response to losing the signal from the lost device; and determining an estimated location of the lost device based on the first position data and the second position data, wherein the lost device is located in an area of limited or no connectivity and the seek device is moving through the area. | 08-07-2014 |
20140222330 | INTEGRATION OF CONTEXTUAL AND HISTORICAL DATA INTO ROUTE DETERMINATION - Generally, this disclosure describes a method and system for route personalization. A method may include, in an embodiment, requesting that a user of a computing device provide a trip modifier in response to a request from the user to map a route from a first location to a second location; acquiring objective data related to the trip modifier for at least one possible route from the first location to the second location; generating a weighted route recommendation associated with each possible route based on the acquired objective data and the trip modifier; and displaying each possible route and its associated weighted route recommendation on the computing device, wherein the trip modifier comprises at least one user characteristic and each weighted route recommendation is configured to provide a personalized route recommendation to the user for the respective associated possible route. | 08-07-2014 |
20140250490 | AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD - Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTPP. | 09-04-2014 |
20140282679 | DYNAMICALLY IMPLEMENTING AN IMAGE PROTECTION POLICY - Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy. | 09-18-2014 |
20140310525 | METHOD FOR EXCHANGING STRONG ENCRYPTION KEYS BETWEEN DEVICES USING ALTERNATE INPUT METHODS IN WIRELESS PERSONAL AREA NETWORKS (WPAN) - A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network. | 10-16-2014 |
20150026764 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 01-22-2015 |