Patent application number | Description | Published |
20090300131 | Simultaneous remote and local control of computer desktop - A method for computing includes running a desktop sharing program on a local computer so as to permit a remote user to view, on a remote computer, which is connected to communicate with the local computer via a network, an image of an entire area of a display screen of the local computer and to operate the local computer by remote input via the remote computer. A local window is defined within the display screen of the local computer for running an application under control of a local user. Local inputs made via a local input device of the local computer by the local user are intercepted so that the local inputs do not interfere with operation of the local computer by the remote user. The intercepted inputs are directed to the local window so as to permit the local user to interact with the application independently of the operation of the local computer by the remote user. | 12-03-2009 |
20090300510 | Simultaneous remote and local control of computer desktop - A method for computing includes running a desktop sharing program on a local computer so as to permit a remote user to view, on a remote computer, which is connected to communicate with the local computer via a network, an image of an entire area of a display screen of the local computer and to operate the local computer by remote input via the remote computer. A local window is defined within the display screen of the local computer for running an application under control of a local user. Local inputs made via a local input device of the local computer by the local user are intercepted so that the local inputs do not interfere with operation of the local computer by the remote user. The intercepted inputs are directed to the local window so as to permit the local user to interact with the application independently of the operation of the local computer by the remote user. | 12-03-2009 |
20140195759 | Increasing Efficiency of Block-Level Processes Using Data Relocation Awareness - A mechanism is provided for increasing the efficiency of block-level processes. Responsive to detecting an I/O write to a storage volume, a determination is made as to whether the I/O write matches one or more suspicious I/O reads in a plurality of suspicious I/O reads previously recorded in a memory. Responsive to the I/O write matching one or more suspicious I/O reads in the plurality of suspicious I/O reads, an identification is made that there is a data relocation associated with the sector associated with the I/O write. A data relocation application is informed of the data relocation of the sector associated with the one or more suspicious I/O reads associated with the sector indicated by the I/O write. Each sector associated with the one or more suspicious I/O reads is then released in a file system for reuse. | 07-10-2014 |
20140270345 | METHOD AND APPARATUS FOR MOVEMENT ESTIMATION - A method for estimating movement of a mobile device includes: obtaining images from a camera communicatively coupled to a processor of the mobile device; identifying a stationary light source using at least one image of the images; calculating a displacement of the stationary light source based on a first location of the stationary light source in a first image of the images and a second location of the stationary light source in a second image of the images, the first image and the second image being captured at different times; and estimating movement of the mobile device based on the displacement. | 09-18-2014 |
Patent application number | Description | Published |
20140016780 | Method and device for secure phone banking - A small form-factor security device is provided that may be inserted in series with a telephone line to encrypt dual tone multi-frequency (DTMF) tones from a telephone to prevent unauthorized disclosure of sensitive information. A receiving device decrypts the encrypted DTMF tones to receive the original information sent by the telephone. The security device acts as a second factor in a two-factor authentication scheme with a tele-services security server that authenticates the security device. | 01-16-2014 |
20140032424 | Method and apparatus for determining and utilizing value of digital assets - Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison. | 01-30-2014 |
20140149217 | DYNAMIC RESOURCE MATCHING SYSTEM - A method, apparatus, and system are provided for implementing resource and/or location-based matching services between a wireless terminal (e.g., mobile phone) user and one or more resources. A novel infrastructure supports resource and/or location based matching services over a wireless network. A back-end system includes a database, server, and match engine that are configured match a user with one or more resources based on the user's characteristics, preferences, and/or location. Such resources include (1) other users, (2) targeted advertising, (3) businesses/networking opportunities, and/or (4) locate a nearby service or store. A flexible database architecture supports application-specific resources which facilitate the deployment of various matching services. Application developers are thus able to implement different resource-matching applications for wireless devices through a common back-end infrastructure. Additionally, the match engine may include a feedback mechanism that permits the match engine to learn a user's preferences. | 05-29-2014 |
20140351601 | PRODUCT AUTHENTICATION USING END-TO-END CRYPTOGRAPHIC SCHEME - A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes. | 11-27-2014 |
20140372701 | METHODS, DEVICES, AND SYSTEMS FOR DETECTING RETURN ORIENTED PROGRAMMING EXPLOITS - Methods, devices, and systems for detecting return-oriented programming (ROP) exploits are disclosed. A system includes a processor, a main memory, and a cache memory. A cache monitor develops an instruction loading profile by monitoring accesses to cached instructions found in the cache memory and misses to instructions not currently in the cache memory. A remedial action unit terminates execution of one or more of the valid code sequences if the instruction loading profile is indicative of execution of an ROP exploit involving one or more valid code sequences. The instruction loading profile may be a hit/miss ratio derived from monitoring cache hits relative to cache misses. The ROP exploits may include code snippets that each include an executable instruction and a return instruction from valid code sequences. | 12-18-2014 |
20150040200 | METHOD FOR AUTHENTICATING A DEVICE CONNECTION FOR WEBSITE ACCESS WITHOUT USING A WEBSITE PASSWORD - A method herein is for authenticating a device connection for website access without using a website password. In the method, a web server receives an access request over the device connection from a device requesting access to a website based on a pre-established identity. The web server, in response to the access request, forwards an access cookie to the device over the device connection and forwards an activation URL to an address associated with the pre-established identity. The web server receives a request for the forwarded activation URL and, using the access cookie, grants access to the device over the device connection. | 02-05-2015 |
Patent application number | Description | Published |
20090044015 | SYSTEM AND METHOD FOR MANAGING SONIC TOKEN VERIFIERS - A hand-held token can be operated to generate an acoustic signal representing the digital signature generated by a private key of a public key/private key pair. Verifiers that might be located at, e.g. buildings, in vehicles, at bank ATMs, etc. receive the signal and retrieve the corresponding public key to selectively grant access authorization to components served by the verifiers. Methods and systems permit adding and removing a token from the access list of a verifier. Other methods and systems enable the token to be used with several verifiers that are nearby each other, such as might be the case with multiple vehicles owned by the same user and parked nearby each other, without more than one verifier being operated to grant access. | 02-12-2009 |
20120068837 | Apparatus And Method To Detect Vehicle Theft - Disclosed is an apparatus and method to detect vehicle theft. In one embodiment, a processor may be configured to execute instructions to: receive a vehicle detection signal from a vehicle detector; determine whether a vehicle is present or absent based upon the vehicle detection signal; establish an authentication credential after the vehicle is determined to present; and validate the authentication credential to indicate validated parking. If the vehicle is determined to be absent and an authentication credential to un-park the vehicle has not been validated, a notification action may be transmitted to appropriate personnel to indicate that the vehicle has been moved or un-parked without proper authentication. | 03-22-2012 |
20120069992 | Product Authentication Using End-To-End Cryptographic Scheme - A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code associated with a first item is used to generate (at least partially) an outer code associated with a second item that contains one or more first items. This process may be repeated multiple times with codes for outer items being a function of codes for inner items. The sequence of items may be authenticated by the dependent relationship between their codes. | 03-22-2012 |
20120115430 | Mobile Device Having An Emergency Mode - Disclosed is an apparatus and method to locate a mobile device in an emergency situation. The mobile device includes a display device, a user interface to receive an emergency mode request from a user, and a processor. The processor may be configured to execute instructions to implement an emergency mode process based upon the receipt of the emergency mode request from the user. The emergency mode process is implemented to: monitor received signals to locate a base station, wherein, once a base station is located, a short emergency message is transmitted to the base station including the location of the mobile device. The emergency mode process is further implemented to: monitor received signals to receive an acknowledgement signal from the base station; and reduce a plurality of first non-essential functions of the mobile device to reduce power consumption. | 05-10-2012 |
20120254987 | Pairing and authentication process between a host device and a limited input wireless device - Disclosed is an apparatus and method to perform a pairing process with a limited input wireless device. A host device includes a transceiver and a processor. The processor may be configured to execute instructions to: receive from the transceiver a pairing process request from the limited input wireless device, wherein the pairing process request includes a private code based upon a physical user action implemented with the limited input wireless device; and implement a pairing process to validate the limited input wireless device for a particular host device function associated with the private code. | 10-04-2012 |
Patent application number | Description | Published |
20120311485 | Moving A Tile Across Multiple Workspaces - According to one disclosed embodiment, an approach is provided in which a multi-workspace request is received at a machine while the machine is operating in a single workspace mode and while the machine is displaying a first single workspace on a display screen accessible by the machine. The machine includes a number of single workspaces and each of the single workspaces has spaces to display a number of tiles that each correspond to an application. A multi-workspace mode is displayed on the display screen, with the displaying of the multi-workspace mode including displaying a set of the single workspaces on the display screen. Each of the set of single workspaces is displayed in a reduced size in comparison to the single workspace mode. | 12-06-2012 |
20120324400 | Rotation Of Multi-Workspace Environment Containing Tiles - According to one disclosed embodiment, an approach is provided to rotate a workspace displayed on a display screen. The workspace includes visual tiles displayed in a grid layout of columns and rows. A current aspect ratio of the display screen is identified. A current row value and a current column value associated with each of the visual tiles is retrieved. The current aspect ratio is inverted resulting in a new aspect ratio of the display screen. Each of the plurality of visual tiles is rotated ninety degrees. A new row value associated with each of the visual tiles is set to the current column value and a new column value associated with each of the visual tiles is set to the current row value. Each rotated tile is displayed at the new row and column values using the new aspect ratio. | 12-20-2012 |
20150033303 | APPARATUS, SYSTEM, AND METHOD FOR CONTEXT-SENSITIVE ROLLING PASSWORD GENERATION - An apparatus, system, and method are disclosed for context-sensitive password generation. The inspection module may accept entry of at least a new portion of a password by a user into a security mechanism and determine a dynamic parameter candidate within the password. The analysis module may recommend to the user a context-sensitive interpretation of the dynamic parameter candidate. The confirmation module may receive a selection by the user of the context-sensitive interpretation. | 01-29-2015 |
20150046788 | DYNAMIC BROWSER HOMEPAGE CHANGING - An aspect provides a method, including: accessing a memory storing information comprising web page information and timing information; identifying, using the one or more processors, a new web page to use as a homepage based on the web page information and the timing information; and changing, using the one or more processors, a home page setting in a web browser to the new web page according to the web page information and the timing information. Other aspects are described and claimed. | 02-12-2015 |