Patent application number | Description | Published |
20090006532 | DYNAMIC PHISHING PROTECTION IN INSTANT MESSAGING - Method, apparatus, and systems are directed to phishing detection and prevention in Instant Messaging (IM) environments. A variety of sources provide phishing data to a client phishing engine (CAE). The CAE may receive data from various applications local to the client device, from sources external to the client device, user input, and data from a plurality of other client devices. The CAE may employ the data to block access to a site and/or provide a warning message. At least some of the phishing data is provided to a centralized anti-phishing server (CAS) from a plurality of client devices. The CAS then attempts to use the received phishing data to search for the originator of the phishing site, and prevent future messages associated with the site. CAS will provide information about the detected phishing sites to a filtering application, such that the phishing site may be appropriately blocked. | 01-01-2009 |
20090064335 | INSTANT MESSAGING MALWARE PROTECTION - A system including a content server and a plurality of instant messaging clients is configured to enable each client device to scan for malware on incoming or outgoing instant messages. The content server may receive malware configuration information and distribute the malware configuration information to each client device. Each client device may employ the malware configuration information to perform a number of actions, including determining one or more malware scanners to use, selectively scanning incoming or outgoing instant messages, reporting instances of malware that are detected, or selectively restricting one or more instant messaging functions. The system may include a malware information repository that receives and reports of detected malware, analyzes the reports, and determines sources of malware. | 03-05-2009 |
20100070588 | RELIABILITY FOR INSTANT MESSAGING BASED ON END POINT ACKNOWLEDGEMENTS - A reliable IM system is disclosed including an end-to-end mechanism to make sending and receiving IM text messages more reliable. The reliable IM system may include a reliability-enabled client device server device, each including a reliability-enabled messenger component for adding message ID numbers to outgoing IM messages and sending message-specific acknowledgments (ACK) back to a sending client. The reliable IM system may resend a sequenced message N times when the message is identified as missing. The reliability-enabled client and server may be used to communicate with either reliable or non-reliable clients (for example, clients that do not have the reliability-enabled messenger component). An offline storage may be used to accept and store IM messages for offline clients while sending ACKs back for the received messages. Duplicate and lost sequenced messages are handled by deleting duplicate messages and resending lost sequenced messages at the client and/or server to maintain normal IM transactions. | 03-18-2010 |
20100070962 | TARGETED INSTANT MESSENGER BEHAVIORS EMPLOYED FOR OPTIMIZATION OF A CLIENT - A system and method are disclosed for selectively updating software and sending other information, such as advertisements, to an IM client device based on client-side behavior vectors collected from the IM client. Behavior vectors are information related to a software component, such as IM client messenger, client device, and a user of the client device, including, but not limited to core software, optional software, advertisements displayed, usage data, performance data, and client meta data. | 03-18-2010 |
20110041076 | PLATFORM FOR DELIVERY OF HEAVY CONTENT TO A USER - Heavy content is selectively provided over a network to a client device using a background mode based on a user's tracked behavior and other profile information, such that the heavy content may be served up within a web page, messenger application, and/or other application when the user of the client device performs a particular action, such as requesting a web page configured to display the heavy content. Based on the user's profile, heavy content is downloaded onto the user's client device automatically without the user performing additional actions and before the user accesses a web page that may enable access to the heavy content. When the user requests a web page, the web page is parsed to determine whether it is configured for use with heavy content. If so, then the downloaded heavy content is served to the user based on the requested web page and user identifier. | 02-17-2011 |
20120124466 | COMBINATION CREATIVE ADVERTISEMENT TARGETING SYSTEM - A system and method for serving ad creatives to a user includes steps of: monitoring open conversation windows of a client during a login session, wherein each open conversation window is a conversation between the client and a correspondent; receiving client state information associated with each open conversation window; sending the client state information to client state information store; responsive to initiation of a new client session, retrieving the client state information; dynamically computing a template for a combination ad creative customized for each open conversation window associated with the new client session; generating the combination ad creative from the template; and serving the combination ad creative to the client. | 05-17-2012 |
20120226561 | Aggregated Contextual Targeting Advertisements Using Instant Messaging Clients - A method, apparatus and computer program product for displaying to a user an aggregated contextual targeting advertisement using an instant messaging client having an ad line area within an instant messaging graphical user interface, and an ad pop-up area on the same display surface as the instant messaging graphical user interface. The method commences by receiving a user context profile and then selecting at least one advertisement based on characteristics of the user. The method continues by separating the advertisement into a first portion and a second portion for the purpose of displaying the first portion in an ad line area within an instant messaging graphical user interface, and for displaying the second portion in an ad pop-up area on the same display surface as the instant messaging graphical user interface. Some embodiments separate the first portion and the second portion by automatically selecting strings, and/or by automatically selecting images. | 09-06-2012 |
20130061306 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE - In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may authorize an enterprise user based on an enterprise identity. Once authenticated, embodiments may use mapping data and a cloud role to determine an identity to use when the enterprise user accesses a cloud. | 03-07-2013 |
20140331300 | HYBRID CLOUD IDENTITY MAPPING INFRASTRUCTURE - In various exemplary embodiments, a system and associated method for providing a hybrid cloud computing environment are disclosed. For example, a system may authorize an enterprise user based on an enterprise identity. Once authenticated, embodiments may use mapping data and a cloud role to determine an identity to use when the enterprise user accesses a cloud. | 11-06-2014 |
20150286444 | PRINTING DIGITAL IMAGES USING AN IMAGE PRINTING SYSTEM - The present disclosure is directed toward printing of digital images with increased efficiency and ease. In particular, one or more embodiments provide an image printing system that allows a user to print images from a mobile or other device without having to upload a high-resolution version of the digital images to a print vendor. More specifically, one or more embodiments of the image printing system allow users to store images on a remote server or in a cloud storage space. When the users desire to print physical copies of the digital images, the image printing system can provide the digital images to a print vendor without requiring the users to upload the images to the print vendor from the users' own device. | 10-08-2015 |
Patent application number | Description | Published |
20140344350 | Image Session Invitation and Management Techniques - Image session invitation and management techniques are described. In one or more implementations, an invitation to join an image sharing session as a potential member is broadcast, e.g., over a local wireless area network by a computing device. An indication of acceptance is received from the potential member at the computing device, the indication including an identity of the potential member. A communication is formed by the computing device for communication via a network to a service provider that is configured to manage the image sharing session. The communication includes the identity of the potential member and an identity of the image sharing session. The communication is also configured to cause the service provider to add the potential member to the image sharing session to share images with other members of the image sharing session or receive images that are shared by the other members of the image sharing session. | 11-20-2014 |
20140359482 | Image Session Ranking - Image session ranking techniques are described. In one or more implementations, indications are received that a plurality of image sharing sessions are available for joining by one or more potential members. The plurality of image sharing sessions are prioritized based on one or more ranking criteria that are usable to determine a relative likelihood that a user wishes to join respective image sharing sessions. A list is formed of suggested image sharing sessions that are arranged, one or another, based on the priority. | 12-04-2014 |
20150029353 | Automatic Tuning of Images Based on Metadata - Automatic techniques to tune images based on metadata are described. In one or more implementations, image data and metadata are received that references a geographic location. Responsive to a user input, the image data is processed using one or more tuning parameters that correspond to the geographic location to change one or more visual characteristics of the image data. | 01-29-2015 |
20150237143 | Image Session Identifier Techniques - Image session identifier techniques are described. In one or more implementations, a request is received to create an image sharing session and a session identifier is generated for the image sharing session that is configured to act as a credential to join the image sharing session as a member. A communication is formed that includes the generated session identifier and that is configured for communication via a network to an originator of the request. | 08-20-2015 |