Patent application number | Description | Published |
20080238670 | SECURITY DEVICE WITH DISPLAY - A security card may include a printed portion that includes printed data fixed to a first portion of an outer surface of the card, an interface configured to receive digitally signed information from an external device, and a display located on a second portion of the outer surface of the card and configured to display a digital image based on the received digitally signed information. | 10-02-2008 |
20090321517 | SECURITY DEVICE READER - A method performed by a device may include exchanging encryption information with a security card, generating validation information based on the exchanged encryption information with the security card and transmitting the validation information to the security card for display. | 12-31-2009 |
20110078287 | CONTENT AWARENESS CACHING WITH NETWORK-AWARE GEO-LOCATION PROTOCOL - A device receives subscriber information associated with user devices provided in a network, receives network information associated with the network, and receives user device information associated with the user devices. The device also determines content to cache based on the received information, and requests the determined content from a content provider device. The device further receives the determined content from the content provider device, and stores the determined content in a cache device. | 03-31-2011 |
20120069845 | SANITIZING PACKET HEADERS - A network device may receive a packet, determine whether the packet includes two or more headers of a same type, modify the packet to correct for the two or more headers of the same type when the packet includes the two or more headers of the same type, determine whether the packet includes out-of-sequence headers, and modify the packet to correct for the out-of-sequence headers when the packet includes the out-of-sequence headers. | 03-22-2012 |
20120090038 | ELECTRONIC IDENTIFICATION - A method may include forwarding, by a mobile device, a request for identification information associated with a user of the mobile device. The method may also include receiving, from an identification provider, the identification information, and displaying, by the mobile device, at least some of the identification information. | 04-12-2012 |
20120155250 | METHOD AND SYSTEM OF PROVIDING MICRO-FACILITIES FOR NETWORK RECOVERY - An approach provides micro-facilities for network recovery. An outage condition is detected, and is associated with one of a plurality of service provider facilities forming a service provider network. A router of the service provider network is determined to be capable of reaching the one service provider facility, wherein the provider router is resident within a customer facility. Bandwidth is allocated to one or more links for re-directing traffic over the provider router to the one service provider facility. | 06-21-2012 |
20120159586 | METHOD AND APPARATUS FOR IMPLEMENTING SECURITY MEASURES ON NETWORK DEVICES - A method for providing security measures on a network device, such as a router, is disclosed. In one embodiment, a method includes receiving a request for a network resource. The method further includes determining a classification of the request, and generating, based on the determined classification of the request, a security measure corresponding to the determined classification of the request for authentication of the request. The method also includes permitting access to the network resource when a correct response is received to the security measure corresponding to the determined classification of the request. | 06-21-2012 |
20120167160 | ROUTER POLICY SYSTEM - A router policy server may include a policy engine. The policy engine may receive, from a first router, a request for whether to accept or reject routing information received from a second router and determine whether a policy, associated with the second router, allows the second router to advertise the routing information. The policy engine may further instruct the first router to accept the routing information when the policy allows the second router to advertise the routing information and may instruct the first router to reject the routing information when the policy does not allow the second router to advertise the routing information or when no policy exists for the second router in association with the policy engine. | 06-28-2012 |
20120213082 | PREVENTION OF CALL SPOOFING IN A VOICE OVER INTERNET PROTOCOL (VoIP) NETWORK - Call spoofing in a Voice over Internet Protocol (IP) system may be detected and/or prevented. A device may receive a call request to initiate a VoIP call. The device may analyze marker information in the call request to determine whether the call request is valid. The device may also analyze the call request, based on call pattern information of a quantity of other calls, to determine whether the call request is suspicious; and complete the call based on the determination of whether the call request is valid and the determination of whether the call request is suspicious. | 08-23-2012 |
20120271957 | METHOD AND SYSTEM FOR ASSOCIATING A CONTACT WITH MULTIPLE TAG CLASSIFICATIONS - An approach for enabling multiple tag associations to be used for classifying a contact identifier is described. A first tag is associated with a contact identifier for grouping into a first classification; and a second tag is associated with the contact identifier for grouping into a second classification. Storage of the first tag and the second tag is initiated along with the contact identifier as part of a contact list. | 10-25-2012 |
20120280040 | WIRELESS-BASED CHECKOUT AND LOSS PREVENTION - A method may include reading tags associated with items that are leaving a store with a person and receiving an electronic receipt associated with the person. The method may also include comparing the items that are leaving the store with information included in the electronic receipt and determining whether a discrepancy exists based on the comparing. | 11-08-2012 |
20120284101 | MOBILE TRANSACTION SERVICES - A method may include receiving identification information associated with a user, where the identification information is used to store electronic receipts for the user. The method also includes receiving, from a point-of-sale device, transaction information for a transaction involving the user and generating an electronic receipt for the transaction. The method further includes storing the electronic receipt. | 11-08-2012 |
20130160062 | METHOD AND SYSTEM FOR ASSIGNING DEFINITIONS TO MEDIA NETWORK CHANNELS - An approach for assigning definitions to media network channels is described. A demand for program content of a media network channel associated with a first definition relating to resolution of the program content is determined. A second definition is assigned to the media network channel for the program content in response to the demand, wherein the second definition relates to the resolution of the program content and is higher in resolution than the first definition. | 06-20-2013 |
20130169434 | METHOD AND SYSTEM FOR INVOKING A SECURITY FUNCTION OF A DEVICE BASED ON PROXIMITY TO ANOTHER DEVICE - An approach for enabling a security function of a mobile device to be activated based on a change in proximity of another device is described. A notification service determines whether a proximity threshold between a first device and a second device is satisfied based on pairing information corresponding to a wireless link between the first device and the second device. The notification service also generates a control signal to activate a security function to restrict access on either the first device or the second device based on the determination. | 07-04-2013 |
20130219047 | DESKTOP CONTROL OF TRAFFIC TRANSMITTED TO A USER DEVICE - A system is configured to obtain information that identifies a first rate for first traffic associated with an object within a desktop associated with a user device and a second rate for second traffic associated with another object within the desktop; provide a virtual desktop based on the information; create a first zone, within the desktop, associated with the object; create a second zone, within the desktop, associated with the other object; compare the first rate and the second rate to a threshold; provide, via the virtual desktop, the first zone, having first appearance attributes, based on the first rate being greater than the threshold, and the second zone, having second appearance attributes, based on the second rate not being greater than the threshold; receive selection of the first zone; and output a request to control the first traffic based on the selection of the first zone. | 08-22-2013 |
20130260721 | GRANULAR CONTROL SYSTEM - A method may include receiving, from a first party, restrictions associated with each of a number of applications stored on a mobile device and storing the restrictions, wherein the restrictions include time based restrictions and/or use based restrictions. The method also includes receiving, from a user of the mobile device, a request for access to a first application and providing access to the first application in response to the request. The method further includes receiving, from the user, a second request for performing a first action by the first application and determining whether first action is permitted based on the stored restrictions. | 10-03-2013 |
20140179360 | SHORT MESSAGE SERVICE VALIDATION ENGINE - A method, performed by a computer device, may include receiving a Short Message Service (SMS) message. The method may further include analyzing one or more sender parameters associated with the received SMS message to validate the one or more sender parameters; determining whether the one or more sender parameters have been validated based on the analysis; rejecting the SMS message in response to determining that the one or more sender parameters have not been validated; analyzing message content included in the SMS message to validate the message content; determining whether the message content has been validated based on the analysis; rejecting the SMS message in response to determining that the message content has not been validated; and forwarding the SMS message to a recipient, in response to validating the one or more sender parameters and in response to validating the message content. | 06-26-2014 |
20140181966 | CLOUD-BASED DISTRIBUTED DENIAL OF SERVICE MITIGATION - A method, performed by a computer device, may include receiving an indication of a distributed denial of service event at a front end system associated with a customer; generating one or more virtual front end systems for the customer, in response to receiving the indication of the distributed denial of service event; and redirecting traffic intended for the customer's front end system to the generated one or more virtual front end systems. The method may further include determining whether resource capacity of the generated one or more virtual front end systems has been reached; and generating an additional one or more virtual front end systems for the customer, in response to determining that the resource capacity of the generated one or more virtual front end systems has been reached. | 06-26-2014 |
20140282681 | CHAPTERIZED STREAMING OF VIDEO CONTENT - A method includes sending, by a user device, a request for video content based on a selected video content chapter of the video content. The method also includes receiving video content information that includes a list of video content chapters of the video content. The method includes determining, for each listed video content chapter, whether the video content chapter has been previously stored on the user device. The method further includes downloading particular chapters of the video content in a priority order based on the selected chapter in response to a determination that the particular chapters have not been previously stored on the user device, and playing the video content based on the selected chapter. | 09-18-2014 |
20150058976 | METHOD AND APPARATUS FOR MITIGATING DISTRIBUTED DENIAL OF SERVICE ATTACKS - An approach for mitigating distributed denial of service (DDoS) attacks includes assigning a set of temporary network addresses to a hostname for a finite period and assigning one or more other sets of temporary network addresses to the hostname in one or more following finite periods, responding to a hostname lookup request based on the set of temporary network addresses, the one or more other sets of temporary network addresses, or a combination thereof that are active, responding to a network address lookup request based on at least one of the set of temporary network addresses and the one or more other sets of temporary network addresses that is associated with a current one of the finite period or the one or more following finite periods, and retiring the set of temporary network addresses, the one or more sets of temporary network addresses, or a combination thereof after a configurable number of finite periods, wherein no further network address or hostname lookup request is served based on the retired set of temporary network addresses, the retired one or more sets of temporary network addresses, or a combination thereof. | 02-26-2015 |
20150067490 | VIRTUAL INTERFACE ADJUSTMENT METHODS AND SYSTEMS - An exemplary method includes a virtual interface adjustment system detecting, based on user input data associated with user input received by way of a virtual interface of a user device, an erroneous input pattern that includes at least one unintentional input, determining, based on the erroneous input pattern, an adjustment procedure configured to adjust the virtual interface to avert future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern, determining an adjustment procedure trigger for the adjustment procedure, activating the adjustment procedure trigger, detecting, after the activating, an occurrence of the adjustment procedure trigger, and executing, in response to the detecting of the occurrence of the adjustment procedure trigger, the adjustment procedure to avert the future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern. Corresponding methods and systems are also described. | 03-05-2015 |