Patent application number | Description | Published |
20080209526 | System and method for personalized security signature - Embodiments of the present invention provide techniques for authenticating users based on personalized (i.e., user-provided) authentication data. In one set of embodiments, the personalized authentication data includes acoustic, image, and/or video data, but is exclusive of biometric data of the user. In this manner, existing acoustic, image, and video-based authentication interfaces/mechanisms may be leveraged, without the problems associated with verifying biometric data. In some embodiments, a user may enroll or register multiple pieces of personalized authentication data into an authentication system. The user may then select one piece of personalized authentication data for use by the system at a time of authentication. | 08-28-2008 |
20110055548 | ONLINE DATA ENCRYPTION AND DECRYPTION - Systems and methods for providing encryption and decryption of data transmitted on a computer implemented network, preferably user authentication identifier data, such as a password, at the point of entry into the user's computer. The systems and methods enable an end user to mentally select a marker from one of the randomly arranged elements on a first portion of a graphical image. A second portion of the graphical image includes an arrangement of possible elements of any individual authentication identifier sequence, and is positioned adjacent to the first portion. The systems and methods prompt a user to enter each element of the identifier by moving the selected marker and the first portion as necessary to substantially align the selected marker with a chosen element of the authentication identifier appearing on the outer portion. According to one embodiment, the image portions are concentric wheels. According to another embodiment, the image portions are arranged in adjacent rows. | 03-03-2011 |
Patent application number | Description | Published |
20110275562 | INHIBITION OF GLIADIN PEPTIDES - Novel compounds and methods for the inhibition of biological barrier permeability and for the inhibition of peptide translocation across biological barriers are identified. Assays for determining modulators of biological barrier permeability and for peptide translocation across biological barriers are provided. Methods for treating diseases relating to aberrant biological barrier permeability and peptide translocation across biological barriers are provided. Such diseases include celiac disease, necrotizing enterocolitis, diabetes, cancer, inflammatory bowel diseases, asthma, COPD, excessive or undesirable immune response, gluten sensitivity, gluten allergy, food allergy, rheumatoid arthritis, multiple sclerosis, immune-mediated or type 1 diabetes mellitus, systemic lupus erythematosus, psoriasis, scleroderma and autoimmune thyroid diseases. | 11-10-2011 |
20150203537 | INHIBITION OF GLIADIN PEPTIDES - Novel compounds and methods for the inhibition of biological barrier permeability and for the inhibition of peptide translocation across biological barriers are identified. Assays for determining modulators of biological barrier permeability and for peptide translocation across biological barriers are provided. Methods for treating diseases relating to aberrant biological barrier permeability and peptide translocation across biological barriers are provided. Such diseases include celiac disease, necrotizing enterocolitis, diabetes, cancer, inflammatory bowel diseases, asthma, COPD, excessive or undesirable immune response, gluten sensitivity, gluten allergy, food allergy, rheumatoid arthritis, multiple sclerosis, immune-mediated or type 1 diabetes mellitus, systemic lupus erythematosus, psoriasis, scleroderma and autoimmune thyroid diseases. | 07-23-2015 |
Patent application number | Description | Published |
20090282125 | Synchronizing Events Between Mobile Devices and Servers - A system, method, and computer program product for synchronizing events between a mobile device and a server are described herein. In an embodiment, the method operates by detecting events to be synchronized between a source and a target, wherein the source and target are one of either a mobile device or a server. The method comprises deducing activities that occurred in order to create the detected event, reading data records corresponding to the deduced activities, and creating packets of operations needed to recreate the deduced activities on the target. The method further comprises queuing the packets of operations and data records and receiving event synchronization results at the source after the queued packets of operations have successfully executed on the target, wherein the synchronization results include a synchronization status and a unique record identifier identifying the event. In an embodiment, personal information manager (PIM) events are synchronized. | 11-12-2009 |
20100280993 | ACTIVE/PUSH NOTIFICATION FACADE FOR A PASSIVE DATABASE SYSTEM - Systems, methods, computer program product embodiments for an active/push notification facade for a passive database are described herein. An embodiment includes an event listener configured to poll (or query) a passive database and selectively retrieve data objects based on the poll results. Such a selective database read operation may be based on the priority of an event occurring in the passive database. If events of a low priority occur, the event listener does not open the passive database immediately to retrieve additional information related to the low priority event but defers reading the passive database by a pre-determined amount of time. If a higher priority event occurs, the passive database is immediately read to retrieve details related to the high priority event from the passive database. In another embodiment, event listener reads the passive database based on event timestamp information in the passive database and stored timestamp information. | 11-04-2010 |
20100281119 | Deferred Reading of Email Database In Mobile Environments - Systems, methods, computer program product embodiments for deferred reading of email databases are described herein. An embodiment includes an event listener configured to poll (or query) the email server and selectively read an email database associated with the email server. Such a selective database read operation is based on the priority of an event occurring in the email server. If events of a low priority occur, the event listener does not open the email database immediately to retrieve additional information related to the low priority event but defers reading the email database by a pre-determined amount of time. If a higher priority event occurs, the email database is immediately read to retrieve details related to the high priority event from the mail server database. In another embodiment, event listener reads the email database based on when event timestamp information is updated by the email server. | 11-04-2010 |
20110179152 | CONTROLLING LIFETIME OF SERVER ADD-INS - System, method, computer program product embodiments and combinations and sub-combinations thereof for controlling lifetimes of server add-ins are described herein. Embodiments of the invention enable a service module, located at a first server, to externally control lifetime of one or more process add-ins located at a second server. An embodiment includes instantiating the service module at the first server and instantiating, using the service module, a controller add-in at the second server. The service module can instantiate the controller add-in to control the lifetime of (i.e. instantiate or terminate) process add-ins at the second server. In an embodiment, such lifetime control can be performed without shutting down the second server or other operations running on the second server. | 07-21-2011 |
20120066411 | Synchronizing Events Between Mobile Devices and Servers - A system, method, and computer program product for synchronizing events between a mobile device and a server are described herein. In an embodiment, the method operates by detecting events to be synchronized between a source and a target, wherein the source and target are one of either a mobile device or a server. The method comprises deducing activities that occurred in order to create the detected event, reading data records corresponding to the deduced activities, and creating packets of operations needed to recreate the deduced activities on the target. The method further comprises queuing the packets of operations and data records and receiving event synchronization results at the source after the queued packets of operations have successfully executed on the target, wherein the synchronization results include a synchronization status and a unique record identifier identifying the event. In an embodiment, personal information manager (PIM) events are synchronized. | 03-15-2012 |