Patent application number | Description | Published |
20110276495 | ONE-TIME USE PASSWORD SYSTEMS AND METHODS - According to the invention, a method of using a one-time password for a transaction between a user and a merchant is disclosed. The method may include generating the one-time password. The method may also include authenticating the user by the authentication server in response to a request from the user to use the one-time password. The method may further include authorizing the use of the one-time password for the transaction in response to authenticating the user by the authentication server. The method may moreover include using the one-time password in combination with an account number to settle the transaction between the user and the merchant. The method may additionally include sending a message to the authentication server originating from the merchant, wherein the message comprises the one-time password, and wherein the message requests a determination whether the one-time password is authorized for use in the transaction. The method may also include sending a message to the merchant originating from the authentication server, wherein the message includes a determination whether the transaction should be approved in response to the authentication server determining whether the one-time password is authorized for use in the transaction. | 11-10-2011 |
20130124855 | USING QR CODES FOR AUTHENTICATING USERS TO ATMS AND OTHER SECURE MACHINES FOR CARDLESS TRANSACTIONS - Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system. | 05-16-2013 |
20140040147 | SECURE AND CONVENIENT MOBILE AUTHENTICATION TECHNIQUES - Security and convenience are provided by a system, apparatus, method, and computer program product that stores two or more encryption keys that correspond to two or more levels of authentication. The encryption keys may be encrypted and decrypted utilizing an endorsement key and trusted computing techniques. Or the encryption keys may be stored in a secure manner utilizing key protection techniques, such as cryptographic camouflaging. A first encryption key is recovered automatically for the first level of authentication. And input is requested to recover the second encryption key for the second level of authentication. | 02-06-2014 |
20140139318 | Mapping Biometrics To A Unique Key - A technique for mapping a biometric credential of a user to a data value such as a key or password. A database stores multiple entries of biometric templates and associated data values for different users. One of the entries is a match for a particular user, and the remaining entries are randomly selected. The number of entries is reasonably large to provide a desired degree of randomness for a given entry, but smaller than a key space of the data values. Based on an input of a biometric sample of the user, a best match is selected from the entries of biometric templates, and the associated data value is used to authenticate the user. Two- or three-factor authentication can be provided. Additional factors can include a password provided by the user and a key which is encrypted by the data value of the matching entry. | 05-22-2014 |
20150088758 | AUTHENTICATING USERS TO ATMS AND OTHER SECURE MACHINES FOR CARDLESS TRANSACTIONS - Systems, apparatus, methods, and computer program products for using quick response (QR) codes for authenticating users to ATMs and other secure machines for cardless transactions are disclosed. Embodiments of the present disclosure read an image displayed on a display of an external device using a mobile device associated with a user authorized to access a secure resource, decode transaction information encoded in the image, transmit the transaction information and an identifier of the mobile device from the mobile device to an authentication system, and grant access to the secure resource if the transaction information and the identifier satisfy an authentication test performed at the authentication system. | 03-26-2015 |
Patent application number | Description | Published |
20100191768 | SEARCH QUERY CATEGORIZATION FOR BUSINESS LISTINGS SEARCH - A category classification component locates appropriate categories that apply to a user search query. The categories may be yellow page business listings. The category classification component may include a category model that is automatically trained on one or more of a number of possible training data sources. The training data sources may include directory listings, web documents, query traffic, and advertisement traffic. | 07-29-2010 |
20140279261 | DESTINATION AND POINT OF INTEREST SEARCH - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for computerized travel services. One of the methods includes receiving a travel query; identifying points of interest or destinations associated with a travel location; for each of the points of interest or destinations: determining, photographs that are geographically related to the point of interest or destination, selecting a selected photograph from the photographs; obtaining a description associated with the point of interest or destination, obtaining a hotel price associated with the point of interest or destination, and obtaining a flight price for a flight corresponding to the point of interest or destination; and providing for each of the points of interest or destinations, a query result including the respective selected photograph, the respective description, the respective hotel price, and the respective flight price. | 09-18-2014 |
20150161173 | SIMILAR SEARCH QUERIES AND IMAGES - Methods, systems and apparatus, including computer programs encoded on a computer storage medium, for determining similar queries for image searches. In one aspect, a method includes generating, for each of a plurality of search queries, a selection vector for the search query, each selection vector including a plurality of vector elements, each vector element corresponding to a unique image, and the value of each vector element being proportional to a number of selections of its corresponding unique image in response to the unique image being presented as a search result for the search query. The method further includes selecting a first search query and a second search query from the plurality of search queries and determining, from the selection vectors for the first and second search queries, a similarity measure that is a measurement of the similarity of the first search query to the second query. | 06-11-2015 |
20150161175 | ALTERNATIVE IMAGE QUERIES - Methods and systems for suggesting alternative image queries for individual image query search results. In one aspect, a method includes displaying a group of one or more image search results for a first image query, each image search result referring to a respective resource and including a link to the respective resource, receiving first input from a user interacting with a first image search result in the group of one or more image search results, and, in response to receiving the first input, displaying one or more suggested second image queries, where each suggested second image query is associated with the first image search result. | 06-11-2015 |
20150161179 | AUTOMATIC DETERMINATION OF WHETHER A DOCUMENT INCLUDES AN IMAGE GALLERY - Image galleries are automatically located within documents, such as web pages. Documents that are determined to contain image galleries may be treated differently when storing the document for later retrieval by an image search engine. In one implementation, the image galleries are automatically located within a document by calculating position information indicating relative positions of images in the document. The document may be determined to contain an image gallery when the position information indicates that the images in the document are generally evenly distributed. | 06-11-2015 |
Patent application number | Description | Published |
20090217056 | Secure and Usable Protection of a Roamable Credentials Store - A tool which facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing devices utilizing a roamable credential store (RCS) which is highly resistant to offline attack. The RCS facilitates a protected Unified Credential Vault (UCV) via a multi-stage encryption process such that user credentials are protected by making offline dictionary attacks prohibitively expensive to an attacker without causing usability to deteriorate commensurately. | 08-27-2009 |
20090222888 | COMMUNICATING A PASSWORD SECURELY - A secure (e.g., HTTPS) connection is established between a client and a server. Communication over the connection may utilize an application (e.g., a Web browser) that is not part of the client's trusted computing base. A password is sent from the client to the server over the connection such that the clear text password is unavailable to the application. For example, the password can be encrypted and inserted directly into the HTTPS stream from the client's trusted computing base. | 09-03-2009 |
20110087842 | PRE-FETCHING CONTENT ITEMS BASED ON SOCIAL DISTANCE - Retrieving content items based on a social distance between a user and content providers. The social distance is determined based on, for example, user interaction with the content providers. The content providers are ranked, for the user, based on the determined social distance. Prior to a request from the user, the content items are pre-fetched based on the ranked content providers and constraints such as storage space, bandwidth, and battery power level of a computing device of the user. In some embodiments, additional content items are retrieved, or retrieved content items are deleted, as a variable-size cache on the computing device fills or changes size. | 04-14-2011 |
20120260325 | Secure and Usable Protection of a Roamable Credentials Store - A tool facilitates a balancing of security with usability enabling secure user access to multiple secure sites and locations from several computing devices. Access to the multiple secure sites and locations occur by utilizing a roamable credential store (RCS), which is highly resistant to offline attack. The RCS facilitates a protected Unified Credential Vault (UCV) via a multi-stage encryption process such that user credentials are protected by making offline dictionary attacks prohibitively expensive to an attacker without causing usability to deteriorate commensurately. | 10-11-2012 |
Patent application number | Description | Published |
20130066770 | Multi Tenancy For Single Tenancy Applications - A mechanism is provided for deploying software applications in a cloud computing environment. An administrator is provided an interface for allowing a software application that is designed for a single tenant to be used by a plurality of users. An aspect of the invention is to provide a mechanism for quickly and easily giving multi-user qualities to a single tenant application like autoCAD. As such, multiple users can access the application without the need to download and install a version locally on their system. The system is able to determine the period of time for which an application is in use for a given user, because every application is run on a resource that is part of the cloud environment. Therefore, it is possible for the application provider to charge for the application in a usage-based model—e.g. by the hour, or day—without any re-engineering of the existing application. | 03-14-2013 |
20130066945 | Multi Tenant Access To Applications - A mechanism is provided for presenting a software application to a plurality of users in a cloud computing environment. For example, an application that was designed for use by a single user is provided in a cloud based platform without re-architecting the application. Using a web-based interface, multiple cloud users may launch and execute the application. The various instances of the application are provided to the cloud users as if the application were designed as a multi-user application. | 03-14-2013 |
20130067345 | Automated Desktop Services Provisioning - A mechanism is provided for scalably creating and deploying a network of virtual computers with common desktop images in a cloud computing environment. An administrator is provided an interface for defining a user desktop comprising an OS and a set of applications and associated settings. The administrator may further enter the number of roles or remote users. Based on this information the system creates a golden image or master template of the desktop and propagates the image throughout the cloud platform. The underlying provisioning of the virtual machines in the cloud is transparent to the user. The same automated mechanism used for creating the golden image is also used to update the golden image whenever there are updates to the OS or any applications and settings. The system automatically propagates the new image throughout the cloud platform. | 03-14-2013 |
20130067469 | Load Balancing By Endpoints - A mechanism is provided for In a cloud computing infrastructure, a mechanism is provided for balancing client sessions across virtual machines such that the number of virtual machines is efficiently managed. In some embodiments, the total number of virtual machines is minimized to reduce power consumption, cooling, and other cost drivers, while assigning users across the sessions. In one embodiment, the sessions in a virtual machine with low activity are migrated to a virtual machine with higher session rates to allow for the shutdown of the low usage virtual machines. In another embodiment, new user sessions are assigned according to a minimum performance standard. | 03-14-2013 |
20140082059 | MULTI TENANT ACCESS TO APPLICATIONS - A mechanism is provided for presenting a software application to a plurality of users in a cloud computing environment. For example, an application that was designed for use by a single user is provided in a cloud based platform without re-architecting the application. Using a web-based interface, multiple cloud users may launch and execute the application. The various instances of the application are provided to the cloud users as if the application were designed as a multi-user application. | 03-20-2014 |
20140136403 | MULTI TENANCY FOR SINGLE TENANCY APPLICATIONS - A mechanism is provided for deploying software applications in a cloud computing environment. An administrator is provided an interface for allowing a software application that is designed for a single tenant to be used by a plurality of users. An aspect of the invention is to provide a mechanism for quickly and easily giving multi-user qualities to a single tenant application like autoCAD. As such, multiple users can access the application without the need to download and install a version locally on their system. The system is able to determine the period of time for which an application is in use for a given user, because every application is run on a resource that is part of the cloud environment. Therefore, it is possible for the application provider to charge for the application in a usage-based model—e.g., by the hour, or day—without any re-engineering of the existing application. | 05-15-2014 |
Patent application number | Description | Published |
20150336920 | NOVEL COMPOUND, PHARMACEUTICALLY ACCEPTABLE SALT OR OPTICAL ISOMER THEREOF, METHOD FOR PREPARING THE SAME, AND PHARMACEUTICAL COMPOSITION FOR PREVENTION OR TREATMENT OF VIRAL DISEASES CONTAINING SAME AS ACTIVE INGREDIENT - The present invention relates to a novel compound, to a pharmaceutically acceptable salt or optical isomer thereof, to a method for preparing same, and to a pharmaceutical composition for the prevention or treatment of viral diseases containing same as an active ingredient. The novel compound according to the present invention not only has low cytotoxicity but also has excellent antiviral activity against picornavirus such as coxsackievirus, enterovirus, echovirus, poliovirus and rhinovirus, and thus can be effectively used as a pharmaceutical composition for the prevention or treatment of viral diseases such as infantile paralysis, acute hemorrhagic conjunctivitis, viral meningitis, hand-foot-and-mouth disease, vesicular disease, hepatitis A, myitis, myocarditis, pancreatitis, diabetes, epidemic myalgia, encephalitis, cold, herpangina, foot-and-mouth disease, asthma, chronic obstructive pulmonary disease, pneumonia, sinus infection, or otitis media. | 11-26-2015 |