Patent application number | Description | Published |
20080253380 | SYSTEM, METHOD AND PROGRAM TO CONTROL ACCESS TO VIRTUAL LAN VIA A SWITCH - System method and program for controlling access to a VLAN via a port of a VLAN switch system. In response to receipt of a message packet at the port, the switch system determines if a MAC address of the packet matches a MAC address for which the port has been programmed to recognize as a MAC address of a device authorized to communicate with the port. The MAC address of the packet does not match a MAC address for which the port has been programmed to recognize as a MAC address of a device authorized to communicate with the port. In response, the switch system blocks the packet if a rate of ill-formed packets and/or packets from an unrecognized MAC address exceeds a threshold pass rate. The threshold pass rate can be adjusted based on the rate of change of receipt of ill-formed packets and/or packets from an unrecognized MAC address. | 10-16-2008 |
20090044263 | System and Method for On-Demand Dynamic Control of Security Policies/Rules by a Client Computing Device - A system and method for an end user to change the operation of a data flow filter mechanism, such as a firewall, that operates to control data flows between a plurality of protected computing devices and one or more non-protected computing devices. With the system and method, an administrator of a sub-network of computing devices may set a client computing device's scope of rules/policies that may be changed by a user of the client computing device, with regard to a data flow filter mechanism. The user of the client computing device, or the client computing device itself, may then log onto the data flow filter mechanism and modify the operation of the data flow filter mechanism within the limits established by the administrator. | 02-12-2009 |
20090063639 | METHOD AND SYSTEM FOR USING BUSINESS RULES TO CONTROL INVITATIONS TO JOIN INSTANT MESSAGE COLLABORATIONS - A method and system for using business rules to control invitations to participate in instant message (IM) collaborations. A primary invitee is invited to participate in an IM collaboration via a first IM. A business rule associated with the primary invitee is applied to determine that the primary invitee is unavailable to participate in the IM collaboration. A second IM is sent to automatically invite a backup invitee to participate in the IM collaboration. In another embodiment, a primary invitee with credentials specified by a business rule is to be invited to an IM collaboration at a specified time. An application of the business rule determines that the specified time is outside a valid invitation time period or the primary invitee's credentials are not included in a set of predefined credentials. Following the application of the business rule, a backup invitee is invited. | 03-05-2009 |
20090168661 | VISUAL METERING AND RESPONSE TO MAINTAIN VOICE QUALITY IN A VOICE OVER INTERNET PROTOCOL CALL - A computer implemented method, apparatus, and computer usable program product for managing a voice over Internet Protocol call. A selected set of resources associated with a quality of the voice over Internet Protocol call in a data processing system is monitored during the voice over Internet Protocol call. A determination is made as to whether the quality of the voice over Internet Protocol call in a data processing has fallen below a desired level. A corrective action is performed with respect to the selected set of resources in response to the quality of the voice over Internet Protocol call falling below the desired level. | 07-02-2009 |
20090193086 | CONTROL OF AN INSTANT MESSAGE SYSTEM THAT ALLOWS MULTIPLE CLIENTS WITH IDENTICAL CREDENTIALS - A method and system for improving control of an instant messaging system. Multiple instant message (IM) instances are initiated with identical credentials of a user of multiple users participating in an IM session controlled by an IM server. A front-of-screen representation enables the user to manage instance attributes and allows any user to view conversational connectivity information. The IM server receives the user's selection of a graphical element that represents a remote IM instance of the multiple IM instances. Via the first IM instance, the IM server receives the user's request for a computing device to perform an action that includes an interaction with the remote IM instance. The computing device performing the action is located remotely from the user and is executing the remote IM instance. The action is performed by controlling a remote system function of the computing device. | 07-30-2009 |
20090207982 | METHOD AND SYSTEM FOR VOICE MAIL PAUSING - A method and system for automatically pausing a remote voicemail recording to answer an incoming call and to notify an incoming caller of a user voicemail interaction. A command to pause the voicemail recording can be determined by the user prior to establishing the voicemail recording. Upon receiving an incoming call the user can be notified of the incoming call prior to terminating the voicemail recording. The command for pausing voicemail recording can be sent to a voicemail system to pause the voicemail recording if the user opts to receive the incoming call. When the call is concluded, the user can be returned to the voicemail system with options such as resume recording, playback, delete, or cancel the message. | 08-20-2009 |
20090245095 | Voice Over Internet Protocol Clarity During Degradation - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for improving voice over Internet Protocol clarity during degradation. In one illustrative embodiment, the computer implemented method comprises monitoring a call, determining whether degradation exists; and responsive to a determination that degradation exists, applying a corrective action. The computer implemented method further comprises determining whether a quality of the call has improved and responsive to determining that the quality of the call has improved, further monitoring the call to form a monitored quality. The computer implemented method further comprises, determining whether monitored quality is acceptable, and responsive to determining monitored quality acceptable, removing the corrective action. | 10-01-2009 |
20090245486 | METHOD AND SYSTEM FOR IN-PROGRESS VOICEMAIL TRANSFER BASED ON IDENTITY - A method, system and computer-usable medium for terminating an in-progress voicemail and immediately connecting callers to each other based on identity. A telephone system can be enabled to detect that a calling party (e.g., subscriber “A”) receives no answer from a called party (e.g., subscriber “B”) and if the calling party is a current voicemail recipient from the called party then the voicemail message can be discarded by the telephone system. Such an approach enables an immediate connection between the calling party and the called party to each other by a call switching component. The incomplete voicemail message in the voicemail system is automatically discarded. A command to discard and/or erase the voicemail message can be predetermined by the telephone system. | 10-01-2009 |
20090247147 | Predictive Mobile Phone Service Disruption Service - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for a predictive mobile phone service disruption service. In one illustrative embodiment, the computer implemented method comprises monitoring a cellular call of a caller, calculating a location and vector of the caller, and determining whether the caller is approaching a drop zone. The computer implemented method responsive to determining the caller is approaching a drop zone, estimates a duration of a loss of service, and responsive to determining the caller is approaching a drop zone, selectively notifying the caller. | 10-01-2009 |
20100226486 | METHOD OF INFORMING A TELECONFERENCE PARTICIPANT THAT A PERSON-OF-INTEREST HAS BECOME ACTIVE WITHIN THE TELECONFERENCE - A computer implemented method, a computer program product, and a data processing system inform a teleconference participant that a person-of-interest has become active within the teleconference. A user is identified. A person-of-interest, an alert condition, and a notification method are received from the user. The identification, the alert condition, and the notification method are then stored in a person-of-interest data structure. When a user connects to a teleconference, the person-of-interest data structure is retrieved. The teleconference is then monitored for the occurrence of the alert condition. Upon the occurrence of the alert condition, the notification is delivered to the user according to the notification method. | 09-09-2010 |
20110135073 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF CONFERENCE MODERATOR PASSWORD UTILIZATION FROM A NON-AUTHORIZED DEVICE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. An authorized device registry is created in an electronic database, wherein the authorized device registry identifies one or more authorized devices permitted to access the conference calling system. A request to access the conference calling system is received from a device; and, a processor determines whether the device is included in the authorized device registry. If the device is included in the authorized device registry, the device is granted access to the conference calling system. If the device is not included in the authorized device registry, however, are performed by the processor. | 06-09-2011 |
20110135080 | METHOD TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTING RE-USE OF CONFERENCE MODERATOR PASSWORDS - An embodiment of the invention provides a method for detecting fraudulent use of a moderator passcode in a conference calling system. The method sets a threshold number of moderator passcodes permitted in a conference call. The total number of moderator passcodes entered into the conference call is determined and compared to the threshold number with a processor. The conference call is allowed to continue if the threshold number exceeds the total number of moderator passcodes entered into the conference call. If, however, the total number of moderator passcodes exceeds the threshold number of moderator passcodes, the processor performs validation actions and/or alert actions. | 06-09-2011 |
20110135081 | METHODS TO IMPROVE FRAUD DETECTION ON CONFERENCE CALLING SYSTEMS BY DETECTION OF NON-TYPICAL USEAGE OF MODERATOR PASSCODE - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more access parameters are received, wherein the access parameters include an authorized day of week parameter, an authorized time of day parameter, and/or an authorized location parameter. One or more requests to access the conference calling system are received, wherein each request includes a user passcode and one or more request parameters. A processor determines whether the request parameters match the access parameters. Access to the conference calling system is granted when the request parameters match the access parameters; however, the processor performs actions when a request parameter does not match an access parameter. | 06-09-2011 |
20110135082 | METHODS TO IMPROVE SECURITY OF CONFERENCE CALLS BY OBSERVATION OF ATTENDEES' ORDER AND TIME OF JOINING THE CALL - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. A threshold period is received, wherein the threshold period indicates the maximum allowable time period for a participant of a conference call to enter the conference call prior to the entry of the moderator of the conference call. A monitor detects the entry of the moderator into the conference call and entry of the participants into the conference call. A waiting period is determined for one or more of the participants, wherein the waiting period represents the time period between the entry of the moderator and the entry of the participant. A processor compares the waiting period to the threshold period. If the threshold period exceeds the waiting period, the conference call is allowed to continue. In at least one embodiment, actions are performed with the processor if the waiting period exceeds the threshold period. | 06-09-2011 |
20110135083 | Methods to Improve Fraud Detection on Conference Calling Systems Based on Observation of Participants' Call Time Durations - An embodiment of the invention includes a method for detecting fraudulent use in a conference calling system. One or more time duration thresholds are received for a conference call. The conference call is monitored to determine an attendee duration, a participants duration, and/or a conference call duration. The attendee duration represents the call duration of an attendee of the conference call; the participants duration represents the total call duration of all of the attendees combined; and, the conference call duration represents the call duration of the conference call. The time duration thresholds are compared to the attendee duration, participants duration, and/or conference call duration. Actions are performed by a processor if the attendee duration, participants duration, and/or conference call duration exceeds the time duration thresholds. | 06-09-2011 |
20120297323 | METHOD, SYSTEM AND PROGRAM PRODUCT FOR ASSIGNING A RESPONDER TO A REQUESTER IN A COLLABORATIVE ENVIRONMENT - A method, system and program product for assigning a resource to a client in a collaborative environment. The method includes defining, using a tool, a threshold value for collaborative attributes for each resource responding to one or more clients and calculating on a periodic basis, using the tool, an updated value for the collaborative attributes for each resource. The method further includes comparing, upon receipt of a collaboration request, the updated value with the threshold value defined for collaborative attributes for a first resource and, if the updated value is less than the threshold value for the first resource, connecting the client to the first resource for establishing a collaborative session. If not, repeating comparing the updated value with the threshold value for the collaborative attributes defined for a next resource and connecting the client to the next resource whose updated value is less than the threshold value. | 11-22-2012 |
20130291063 | Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints - A system for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes multiple network endpoints and multiple agents running on endpoints. The agents are adapted to periodically locate WAPs and to report located WAPs to a central entity. The system further includes a central entity operative to receive information from the agents regarding located WAPs, to determine whether at least a given one of the located WAPs needs to be probed, and to initiate active probing of located WAPs when it is determined that the given one of the located WAPs needs to be probed. | 10-31-2013 |
20130291067 | Identification of Unauthorized or Misconfigured Wireless Access Point Using Distributed Endpoints - A method for identifying unauthorized and/or misconfigured wireless access points (WAPs) in a communication network includes the steps of: an agent running on an endpoint in the communication network locating one or more WAPs in the communication network; the agent reporting at least one located WAP to a central entity; and the central entity performing steps of applying prescribed criteria to determine whether the located WAP needs to be probed, and initiating active probing of the located WAP when it is determined that the located WAP needs to be probed to thereby determine whether the located WAP is unauthorized and/or misconfigured. | 10-31-2013 |
20140139703 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140139704 | Camera Resolution Modification Based on Intended Printing Location - An embodiment of the invention provides a method for determining picture resolution to optimize storage, wherein input is received from a user interface. The input includes a selected picture destination, such as a printer, a photograph processing service provider, a web application, a website, and/or a display. Attributes of the picture destination are determined with a processor, wherein the attributes of the picture destination include a print resolution, a print size, a screen resolution, and/or a image size. The processor determines the picture resolution based on the attributes of the picture destination. | 05-22-2014 |
20140173724 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example method includes gaining access to or creating an alert database and a signature set by an analytics module and an adjustment module, where the alert database includes an alert validity attribute for each alert; quantifying for each signature contained in the signature set an effect on the change in the number of alerts from its removal; determining with an analytics module whether any signature has a ratio of valid to false positive alerts less than a threshold; and when at least one signature has the ratio less than the first threshold identifying and removing with an adjustment module at least one signature from the signature database having a ratio less than the threshold where the signature is removed from the signature set, and repeating quantifying and determining. | 06-19-2014 |
20140173727 | Tuning of Data Loss Prevention Signature Effectiveness - In at least one embodiment, a method and a system include capability to fine-tune a data loss prevention system. An example system includes a computer readable storage medium for storing at least one alert database and at least one associated signature set to each alert database; an analytics module in communication to the computer readable storage medium, the analytics module analyzes at least one alert database present on the computer storage medium to determine whether any signatures from the signature set associated with the alert database being analyzed are ineffective based at least on a ratio of valid alerts to false positive alerts for individual signatures selected from a group including a plurality of signatures present in the signature set; and an adjustment module in communication to the computer readable storage medium and the analytics module, the adjustment module removes at least one ineffective signature from the signature set. | 06-19-2014 |
20140176314 | Smart Device to Media Device Coupling to Create Virtual Control Environment - An embodiment of the invention provides a method including receiving in an antenna of a smart device first wireless command and control data from a first electronic device. The antenna receives additional wireless command and control data from at least one second electronic device. The first wireless command and control data and the additional wireless command and control data are automatically received from the first electronic device and the at least one second electronic device without input to the smart device from a user. A universal interface is created in the smart device based on the first command and control data and the additional command and control data, wherein the first electronic device and the at least one second electronic device are controllable by the universal interface. | 06-26-2014 |
20140181890 | Quantifying Risk Based on Relationships and Applying Protections Based on Business Rules - An embodiment of the invention provides a method for controlling access to a system, wherein a request to access the system and metadata of the request are received from a user, the request including a user identification. The metadata includes: information obtained from a history of prior accesses to an application access system, information obtained from a history of prior accesses to a wireless authentication system, and/or confirmation of the user identification by an entity physically proximate to the user. A database is queried with the user identification and the metadata to identify relationship data. The relationship data indicates the relationship between the individual assigned the user identification and an entity owning the system, an entity leasing the system, and/or an entity operating the system. The relationship data is input into a rules engine; and, security measure(s) are selected with the rules engine based on the relationship data. | 06-26-2014 |
20150026806 | Mitigating a Cyber-Security Attack By Changing a Network Address of a System Under Attack - In response to determining that a computer is undergoing a cyber attack, a newly assigned IP address is received for the computer. A currently assigned IP address of the computer is changed to the newly assigned IP address. | 01-22-2015 |
20150073985 | Selectively Using Degree Confidence for Image Validation to Authorize Transactions - An embodiment of the invention provides a method for selectively using degree confidence for image validation to authorize transactions, wherein a request to authorize a transaction is received, the request including a user's name, a photo of the user, and a transaction value. A database is queried with the user's name to identify one or more reference photos of the user; and, the received photo of the user is compared to the reference photo of the user with an analysis engine to generate a confidence value. An authorization threshold is determined with a processor based on the transaction value. The transaction is authorized when the confidence value is equal to and/or greater than the authorization threshold. | 03-12-2015 |