Patent application number | Description | Published |
20100045699 | Dynamic Exploration Of Electronic Maps - A mapping engine receives map data from a map server and displays electronic maps. The mapping engine also receives one or more templates that specify metrics to show with the map. The templates specify metrics to accomplish specific tasks, such as house hunting. Metrics describe attributes of the areas shown in the map and are received from a metrics server or another source. Metrics are static or dynamic. Some metrics are explicitly specified, while other metrics are computed in response to the map data and/or other metrics. One or more of the templates are designated as “active,” and the mapping engine displays the metrics of the active templates. The mapping engine displays some metrics on the map and other metrics in a metrics panel. | 02-25-2010 |
20100106786 | Methods and systems for automatically presenting users with option to call sender responsive to email message - A mail server collects messages from a number of user accounts and presents them to the user from a single location. Forwarded messages are automatically reformatted for the receiving device, while a copy of the original message is retained. Messages may be reformatted to include the phone number of the message sender. The reformatted message can then present the user with an option to return the message via a phone call. The reformatted message can include more than one phone number, in which case the sender's phone numbers can be prioritized for presentation to the user. The reformatted message can also present the user with an option to review notes or other contact-specific information prior to responding to the message. | 04-29-2010 |
20120023221 | EVENT CORRELATION IN CLOUD COMPUTING - The present invention pertains to cloud computing systems and handling of events that occur in the cloud. A correlation system obtains and analyzes various events to obtain comprehensive information about the behavior of the cloud. An event repository receives and maintains time-stamped events, which may be obtained from the cloud itself or from external sources reporting on the cloud. A query engine is employed to select, filter and aggregate events from the event repository. The query engine may take into account metadata which describes relationships between different parts of the cloud. Results from the query engine may be presented on a display or otherwise reported. Using such information, the system may fix known problems or change certain parameters to improve the cloud computing process. | 01-26-2012 |
20140101295 | Container Interrupt Services - A container application is a native application that provides a web based application with access a computer's system resources and windowing system. If a container application is associated with a window, then the web based application can alter or control many, or all, aspects of the container application's content area and meta user interfaces (Uis). Web based applications are downloaded from application servers and run inside container applications. A container application can run a web based application as a service. Services made from web based applications running in container applications are almost indistinguishable from operating system services when there is no associated window. | 04-10-2014 |
20140222722 | Adaptive system for continuous improvement of data - Adaptive system and process for improvement of data. A first rules module applies one or more data accuracy rules to a data input to improve data accuracy of the input. A second rules module applies one or more meta rules while applying data accuracy rules, the one or more meta rules invoking another event to improve data accuracy. | 08-07-2014 |
20150163260 | Systems and Methods for Messaging Multiple Devices - Certain implementations of the disclosed technology may include systems, methods, and computer-readable media for disseminating messages to multiple devices. According to an example implementation, a method is provided that includes receiving, at one or more computing systems, a rule comprising a message and routing instructions for dissemination of the message to at least two of a plurality of computing devices in communication with the one or more computing systems. The method includes extracting from the rule, by at least one of the one or more computing systems, the message and routing instructions; determining, from the routing instructions and from device information, the at least two of the plurality of computing devices for dissemination of the message; and sending, based on the routing instructions, the extracted message to the at least two of the plurality of computing devices. | 06-11-2015 |
20150347725 | Dynamic Authorization - Systems and techniques are provided for dynamic authorization. A signal may be received from a sensor. A concept may be determined from the signal. The concept may be a location of a computing device, an action being performed with the computing device, an identity of a user of the computing device, or a temporal context for the computing device. A current pattern may be determined from the concept. The current pattern may be matched to a stored pattern. The stored pattern may be associated with a security outcome. The security outcome may be sent to be implemented. A security message may displayed indicating the security outcome and part of the stored pattern that was matched to the current pattern. The security outcome may be causing presentation of an authentication prompt or not causing presentation of an authentication prompt. | 12-03-2015 |
20150371064 | Security Adjustments In Mobile Devices - Systems, device and techniques are disclosed for implementing a security configuration change based on one or more base events and a current security configuration. An inference module may identify a security configuration change based on receiving base events from a state storage/event listener and analyzing the base events to determine if a current security configuration is optimal given the base events. | 12-24-2015 |
20150373050 | Aggregation of asynchronous trust outcomes in a mobile device - Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome. | 12-24-2015 |
20150373051 | Dynamic authentication using distributed mobile sensors - Systems and techniques are provided for dynamic authentication using distributed mobile sensors. According to an embodiment of the disclosed subject matter, signals may be received from sensors. Some of the sensors may be located on a remote computing device. Heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems may be applied to the signals from sensors to determine a trust outcome. The trust outcome may be sent to be implemented by the enabling, disabling, or relaxing of a security measure based on the trust outcome. | 12-24-2015 |