Patent application number | Description | Published |
20090235359 | METHOD AND SYSTEM FOR PERFORMING SECURITY AND VULNERABILITY SCANS ON DEVICES BEHIND A NETWORK SECURITY DEVICE - A method and system of performing vulnerability and security scans on an internet connected device where the device is behind a network security device such as a firewall. The method is performed by having an agent that is local to the device to be scanned create a VPN connection with a scanning server and then performing the scanning over the VPN. The connection is terminated at the end to free up system resources. | 09-17-2009 |
20100121681 | Method and System of Contextual Advertising - A method of advertising using a user profile based on a user's interaction with websites, including the time spent on the website and the user's rating of keywords associated with the contents of the website. | 05-13-2010 |
20100275024 | METHOD AND SYSTEM FOR DISPLAYING VERIFICATION INFORMATION INDICATORS ON A NON-SECURE WEBSITE - A method and system of displaying information indicators that help provide security assurances to consumers. The method works by having a plug-in or browser extension that determines the URL of a browsed to website. The browser then initiates a secure connection to the domain associated with the URL of a browsed-to website. The plug-in can then show an indicator based on whether or not a digital certificate exists. If desired, the plug-in can perform further checks to ensure the validity and authenticity of the certificate. The information indicators can be static, pre-selected by the program, or selected by the end user. | 10-28-2010 |
20100312621 | METHOD AND SYSTEM FOR MANAGING EMAIL - A system is provided for managing email and eliminating spam wherein an email client ( | 12-09-2010 |
20100313268 | METHOD FOR PROTECTING A COMPUTER AGAINST MALICIOUS SOFTWARE - A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful. | 12-09-2010 |
20110264585 | METHOD AND SYSTEM FOR MANAGING EMAIL - A system is provided for managing email and eliminating spam wherein an email client ( | 10-27-2011 |
20120296713 | System of Validating Online Advertising From Third Party Sources - A system is provided for security and validation for online advertising from third party sources. The system identifies outgoing calls to known advertising networks when a DNS user loads a webpage by identifying the outgoing call via a link and investigating the DNS query being called. Once the advertiser network which was called has been identified, the system intercepts the call placed by the advertisement code and redirects the call to a server which holds validated and certified third party ads from a certified network. The certified ad platform answers and responds to the call by feeding back a certified advertisement to be displayed on the page of the web visitor page. | 11-22-2012 |
20130144970 | SYSTEM FOR SERVING CONTENT BASED ON A USER PROFILE - There is provided a computer implemented system and method for building a profile of a user associated with a particular IP address. The system and method include establishing a proxy server for a plurality of discrete client IP addresses and providing a connection there from to a wide area network through the proxy server. A list of resources provided to each of the discrete client IP addresses is logged on the proxy server, and a profile is determined for each of the discrete client IP addresses based on a predetermined formula. Advertisements and content are served to each of the discrete client IP addresses corresponding to the user's profile. | 06-06-2013 |
20140044364 | Method of Image Identification Based on Artificial Intelligence - A method of image identification based on artificial intelligence is provided, the method includes initializing a second computer with a first computer supplying and accepting image data from the first computer to the second computer; comparing the delivered image data in the second computer to pre-existing stored images in the second computer; generating and displaying a first result if the delivered image data is the same as the stored image in the second computer and a second result if the delivered image data is not the same as the stored image data; and un initializing the second computer based on the first and second results. | 02-13-2014 |