Patent application number | Description | Published |
20110129152 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 06-02-2011 |
20120082382 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 04-05-2012 |
20140056521 | DISTRIBUTED DOCUMENT PROCESSING - A system for document processing including decomposing an image of a document into at least one data entry region sub-image, providing the data entry region sub-image to a data entry clerk available for processing the data entry region sub-image, receiving from the data entry clerk a data entry value associated with the data entry region sub-image, and validating the data entry value. | 02-27-2014 |
Patent application number | Description | Published |
20090216795 | SYSTEM AND METHOD FOR DETECTING AND BLOCKING PHISHING ATTACKS - A system and associated method for preventing at least one credential from being submitted to an unauthorized web location. The system comprises 1) a credential blocker for communicating with a database, and 2) the database for storing the at least one credential and an associated set of approved URLs. The credential blocker allows submission of the at least one credential only if at least one URL involved with the submission is a member of the associated set. | 08-27-2009 |
20110055922 | Method for Detecting and Blocking Phishing Attacks - A method for detecting a suspected phishing attack characterized by monitoring strings of characters in a questionnaire presented by a non-approved address to a user terminal for similarity to a substring of a string of sensitive data, such that the substring has a length of one or more characters less than the length of the string of sensitive data, such that on detecting a substring of critical length, an alert is triggered. | 03-03-2011 |
20110060800 | METHOD OF GUARANTEEING THE DELIVERABILITY OF EMAILS AND OTHER MESSAGES - Systems, methods, computer program products, and networks for messaging including sending, receiving and/or tracking messages. In some cases tracking may include updating receipt statuses of sent messages for which receipt notifications were received. In some cases, additionally or alternatively, tracking may include resending messages for which receipt notifications were not received. In some cases, additionally or alternatively, tracking may include receiving receipt notifications for messages which indicate one or more characteristics of the respective receiving systems. | 03-10-2011 |
20120030224 | ENABLING ACTIVE CONTENT IN MESSAGING USING AUTOMATIC DATA REPLACEMENT - Systems, methods, and/or computer program products for automatic pointer activation, acquiring data not included in an obtained dataset and/or for enabling the later acquiring of data not included in the dataset. In some examples, upon automatic activation of a pointer in the dataset, data associated with the pointer may be acquired. In some of these examples the acquired data may include data which requires prior authentication. Additionally or alternatively in some of these examples, the acquired data or a version thereof may include at least one instruction which would not necessarily have been acceptable to every security module in the channel. Additionally or alternatively, in some examples, a pointer may be a candidate for automatic activation if the referenced provider matches any provider listed as being associated with automatic activation. | 02-02-2012 |
20120030556 | METHOD FOR ENABLING INTERACTIVE CONTENT WITHIN MESSAGING APPLICATION - Systems, methods and/or computer program products for presenting data to a user. In some cases, there is an additional processing of data for presentation, as some or all of the data received via a communication channel is replaced by data derived inter-alia by execution of instructions which were not executed during the original processing for presentation. Additionally or alternatively, in some cases at least some of the data transferred via a communication channel is in a form which excludes instruction(s) that could possibly be unacceptable to security module(s) and/or excludes instruction(s) that may be unsupported by a potential receiving system. In these cases, excluded instruction(s) are recovered and executed during the processing for presentation to a user. Additionally or alternatively, in some cases instead of presenting to a user received data such as content of a previously attached file, the data is stored and a reference to the stored data is presented. | 02-02-2012 |
20130007633 | METHOD AND SYSTEM FOR ENHANCING MESSAGE LIST FUNCTIONALITY - Systems, methods, computer program products, and networks for enhancing message list functionality. In some embodiments, a method includes: after a message in a message list has been indicated by a user performing a gesture on an input module manipulating a graphical user interface whose content included the message list so as to enable data, which relates to content of the message, and which was not visible when the user performed the gesture, to be displayed to the user. | 01-03-2013 |
20130086187 | SYSTEM AND METHOD FOR INDICATING VALID SENDER - Systems, methods, computer program products, and networks for messaging. An example of a method includes outputting a receiver specific indication of validation to a receiver of a message if a sender of the message has been validated. In this example data regarding the receiver specific indication was selected prior to the outputting, the selected data including data associated with the receiver on a website of the sender. | 04-04-2013 |
20130145474 | CONCEALING AND REVEALING MESSAGE DATA - Systems, methods, computer program products, and networks for messaging. In some examples the identity of a sending user of a message and/or other data is initially concealed when the (manipulated) message or an associated created message is sent to an intended receiving user. In these examples, revealing data which enables determination of at least some data which the sent message concealed is only provided upon request, and in some of these examples, only after a user has been authenticated as being an intended receiving user. | 06-06-2013 |