Patent application number | Description | Published |
20110296187 | CLAIM BASED CONTENT REPUTATION SERVICE - In some embodiments, a system may comprise a database and one or more servers. The database may, for example, store a plurality of content claims for previously evaluated data items, with each of the plurality of content claims being associated in the database with a corresponding stored digital fingerprint of a previously evaluated data item. The server(s) may, for example, be configured to receive a determined digital fingerprint of a data item from a client device on another network node, to submit a query to the database using the determined digital fingerprint as a primary key, and to transmit one or more content claims returned by the query to the client device. In some embodiments, the server(s) may be further configured to receive the content claim(s) and the digital fingerprint associated therewith from one or more computers on another network node, and to cause the received content claim(s) and digital fingerprint associated therewith to be stored in the database. | 12-01-2011 |
20120324581 | System, Method and Device for Cloud-Based Content Inspection for Mobile Devices - A content inspection system provides cloud-based content inspection for mobile devices. The content inspection system includes a content inspection server for receiving a request providing a digital fingerprint of content for evaluation for threats and a data reputation services server for maintaining a threat database. The content inspection system communicates with the mobile device using a service oriented architecture web services based on exchanges of messages between agents of the content inspection system and the mobile device. The content inspection server authenticates the received request belongs to a subscriber, and once the request is authenticated, the data reputation services server operates on the request to determine whether content identified by the digital fingerprint matches pre-existing claims in the threat database. The content inspection system generates a threat evaluation response for the mobile device based on reviewing the threat database for pre-existing claims. | 12-20-2012 |
20130218933 | CONSISTENT SELECTIVE SUB-HIERARCHICAL SERIALIZATION AND NODE MAPPING - An object hierarchy corresponds with a serialized file. The object hierarchy is generated from the serialized file by a generation tool. Non-root objects are attributed with an entity type, namespace, name, and link to their parent object. When an object changes, serialization layer code builds an XPath and produces a partial serialization for local and/or remote users while avoiding the overhead of re-serializing the entire changed hierarchy. The updated serialization may be granular or may include the entire hierarchy. Two users may authorize chronologically overlapping changes to different objects with neither user locking out the other user. Each user receives a respective corresponding updated serialization (granular or non-granular) of the object hierarchy without causing a full re-serialization overhead. A modified object is mapped to an XPath-compatible location in a serialization of the hierarchy. Relationships between individual objects and their properties, and between objects, are maintained when creating the serialization. | 08-22-2013 |