Patent application number | Description | Published |
20090306981 | Systems and methods for conversation enhancement - This invention description details systems and methods for improving human conversations by enhancing conversation participants' ability to: —Distill out and record core ideas of conversations. —Classify and prioritize these key concepts. —Recollect commitments and issues and take appropriate action. —Analyze and uncover new insight from the linkage of these ideas with those from other conversations. | 12-10-2009 |
20090319265 | Method and system for efficient pacing of speech for transription - A method and system for improving the efficiency of real-time and non-real-time speech transcription by machine speech recognizers, human dictation typists, and human voicewriters using speech recognizers. In particular, the pacing with which recorded speech is presented to transcriptionists is automatically adjusted by monitoring the transcriptionists' output by comparing the output acoustically or phonetically to the presented recorded speech as well as monitoring the resulting transcription, and accordingly adjusting the pacing. | 12-24-2009 |
20110087491 | Method and system for efficient management of speech transcribers - A method and system for improving the efficiency of speech transcription by automating the management of a varying pool of human and machine transcribers having diverse qualifications, skills, and reliability for a fluctuating load of speech transcription tasks of diverse requirements such as accuracy, promptness, privacy, and security, from sources of diverse characteristics such as language, dialect, accent, speech style, voice type, vocabulary, audio quality, and duration. | 04-14-2011 |
20110185421 | SYSTEM AND METHOD FOR NETWORK SECURITY INCLUDING DETECTION OF MAN-IN-THE-BROWSER ATTACKS - A method is performed in a network security system implemented in a computer or electronic device that is coupled to secured online resources for detecting unauthorized accesses of those secured online resources. The method includes monitoring a user activity session. It is determined whether the user activity session is indicative of a hidden session by an attacker, where the determination includes comparing the user activity session to an average user activity session. | 07-28-2011 |
20110214187 | System and Method for Network Security Including Detection of Attacks Through Partner Websites - A computer readable storage medium with instructions executable on a host computer. The instructions record a relationship between a partner site and the host computer, substitute a reference to the partner site with a partner site alias referencing the host computer, deliver the partner site alias to a client, replace the partner site alias for the reference to the partner site in response to receiving the partner site alias from the client and augment the address of the client with an address alias. The address alias is sent to the partner site. A partner action and the address alias are received from the partner site. The address is exchanged for the address alias. The partner action is delivered to the client utilizing the address. These operations are monitored to identify client activity that constitutes a security threat at the host computer or the partner site. | 09-01-2011 |
20110302653 | System and Method for Network Security Including Detection of Attacks Through Partner Websites - A computer readable storage medium has instructions for execution on a computer. The instructions monitor transactions between a server and a set of clients. An evaluation of session indicators associated with the transactions is performed. Individual sessions between the server and individual clients of the plurality of clients are isolated in response to the evaluation. | 12-08-2011 |
20120016633 | SYSTEM AND METHOD FOR AUTOMATIC DETECTION OF ANOMALOUS RECURRENT BEHAVIOR - A non-transitory computer readable storage medium includes executable instructions to observe the distribution of the frequency of a recurrent behavior to form a histogram. A rehistogram of the histogram is computed to model the distribution of the frequency of the frequency of the recurrent behavior. The rehistogram provides an individual frequency relative to the total frequency of the recurrent behavior. The individual frequency is compared to a predicted frequency to form a difference frequency. An anomaly event is identified when the difference frequency exceeds an anomaly threshold. | 01-19-2012 |
20130221041 | Sliding-Carriage Garment Hanger - A hanger assembly for a garment including a neck opening and a pair of shoulder areas, including: a frame having a pair of lateral ends, each lateral end configured to support one shoulder area of the pair of shoulder areas from inside the garment; and a suspensor, coupled to the frame to transition between a pair of locations along the frame with the pair of locations including a first location generally centered between the pair of ends and a second location closer to a particular lateral end than an other lateral end, the suspensor having a suspending mode wherein the suspensor is located at the first location and an insertion-removal mode in which the suspensor is located at the second location. | 08-29-2013 |
20140149569 | CORRELATIVE MONITORING, ANALYSIS, AND CONTROL OF MULTI-SERVICE, MULTI-NETWORK SYSTEMS - Methods and devices for correlative monitoring, analysis, and control of multi-service, multi-network systems are provided herein. Exemplary methods may include generating a network topology graph of a metanetwork using traffic records obtained from the metanetwork, generating a causal digraph of the metanetwork using the traffic records and the network topology graph, and transmitting one or more of the network topology graph and the causal digraph to a computing system. | 05-29-2014 |