Patent application number | Description | Published |
20110238790 | Auditable distribution of a data file - Auditable data distribution from a server to clients is achieved as follows. The server delivers chunks of a data file, and identifiers of the chunks, to the clients. For each chunk of the data file received by the clients, a digest is generated by the client that received the chunk, using at least a part of the chunk and further data of the client that received the chunk. The further data is known to the server. The client that received this chunk sends the digest to the server, which receives the digest. The server determines an identity of the clink that received the chunk in question, by comparing the digest to the chunks that the server has sent and to the further data known to the server. The server stores the identity of the client that received the chunk. | 09-29-2011 |
20140280787 | Auditable distribution of a data file - Auditable data distribution from a server to clients is achieved as follows. The server delivers chunks of a data file, and identifiers of the chunks, to the clients. For each chunk of the data file received by the clients, a digest is generated by the client that received the chunk, using at least a part of the chunk and further data of the client that received the chunk. The further data is known to the server. The client that received this chunk sends the digest to the server, which receives the digest. The server determines an identity of the clink that received the chunk in question, by comparing the digest to the chunks that the server has sent and to the further data known to the server. The server stores the identity of the client that received the chunk. | 09-18-2014 |
Patent application number | Description | Published |
20080271146 | Identifying a distributed denial of service (DDoS) attack within a network and defending against such an attack - The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone connections to determine a packet metric parameter. The packet metric parameter which might comprise the volume of packets received is analysed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located. The expected behaviour can be employed to identify traffic distortions revealing a DDoS attack. In a complementary aspect, the invention provides a method of authenticating packets at routers in order to elevate the QoS of authenticated packets. This method can be used to block or filter packets and can be used in conjunction with the DDoS attack detection system to defend against DDoS attacks within the Internet in a distributed manner. | 10-30-2008 |
20080313469 | STATELESS METHODS FOR RESOURCE HIDING AND ACCESS CONTROL SUPPORT BASED ON URI ENCRYPTION - An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier (URI), according to a stateless method for hiding resources and/or providing access control support. Upon receipt of a URI having an encrypted portion, the invention decrypts the encrypted portion using a predetermined key to obtain a decrypted segment, extracts additional information from the decrypted segment and forms a decrypted URI, before the decrypted URI is forwarded to a resource producer server. The invention may also encrypt a URI from a resource provider server before it is sent to a client in response to a client request. | 12-18-2008 |
20090204690 | IDENTIFYING A LOCATION OF A SERVER - A method for identifying a geographic location of a server. A request is delivered to the server to send back a message via a cellular network; the message of the server is received via a cell of the cellular network; cell location information about the geographic location of the cell that received the message is delivered; the cell location information is used as information about the geographic location of the server. | 08-13-2009 |
20090313136 | Stateless Methods for Resource Hiding and Access Control Support Based on URI Encryption - An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier (URI), according to a stateless method for hiding resources and/or providing access control support. Upon receipt of a URI having an encrypted portion, the invention decrypts the encrypted portion using a predetermined key to obtain a decrypted segment, extracts additional information from the decrypted segment and forms a decrypted URI, before the decrypted URI is forwarded to a resource producer server. The invention may also encrypt a URI from a resource provider server before it is sent to a client in response to a client request. | 12-17-2009 |
20110035241 | Anonymous Separation of Duties with Credentials - A system for anonymous separation of duties with credentials includes an identity provider, the identity provider configured to issue anonymous credentials to a user based on one or more attributes of the user; a service provider, the service provider configured to issue a pseudonym to the user based on the user's anonymous credentials, and to associate the user's pseudonym with a step of an instance of a business process hosted on the service provider, the step being completed by the user; and an auditor, the auditor configured to determine if the completion of the step of the instance of the business process by the user is compliant with a separation of duties policy. | 02-10-2011 |
20140165154 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20140165188 | USING DATA ANALYTICS AND CROWDSOURCING TO DETERMINE ROLES FOR A COMPUTER SYSTEM - In an embodiment of the invention, wherein users must be able to access a computer system to perform respective functions, initial data is acquired from data sources, some of the initial data pertaining to previously granted system access rights. The initial data is used to create a crowdsourcing task, which is executed to acquire crowdsourced data from SMEs in an SME population, wherein the crowdsourced data comprises additional data pertaining to previously granted system access. The crowdsourced data is used to create a set of role definitions, wherein the role definitions determine which of the users are assigned to be members of a particular role associated with the system, and further determine the access rights that are granted to each member of the particular role. | 06-12-2014 |
20140215603 | AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM - An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a succession of access events in an access log, each event comprising an instance of the system being accessed by a user. The embodiment further analyzes recorded access events in the access log at selected time intervals, to detect a condition or violation of rules of the set of rules. Responsive to detecting a condition or violation, the embodiment selectively determines whether any change to the users or permissions of a specified role is needed. Each needed change is then implemented. | 07-31-2014 |
20140215604 | AUTOMATED ROLE ADJUSTMENT IN A COMPUTER SYSTEM - An embodiment of the invention is associated with a system having a role for controlling user access, the role comprising users, permissions, and a set of rules. The embodiment records each of a succession of access events in an access log, each event comprising an instance of the system being accessed by a user. The embodiment further analyzes recorded access events in the access log at selected time intervals, to detect a condition or violation of rules of the set of rules. Responsive to detecting a condition or violation, the embodiment selectively determines whether any change to the users or permissions of a specified role is needed. Each needed change is then implemented. | 07-31-2014 |
20150317658 | DETERMINING A LOWEST PRICE FOR A DYNAMICALLY PRICED PRODUCT - In one embodiment, a computer-implemented method includes receiving a request for a product. Two or more fingerprints are selected, where each fingerprint includes digital data describing a corresponding virtual customer. By a computer processor, a first fingerprint is loaded to emulate a first virtual customer. A first price query is submitted to a vendor's web service for the product, where the first price query uses the loaded first fingerprint. A second fingerprint is loaded to emulate a second virtual customer. A second price query is submitted to the vendor's web service for the product, where the second price query uses the loaded second fingerprint. Two or more prices are received from the vendor's web service, including a first price received in response to the first price query and a second price received in response to the second price query. A lowest price is selected from among the prices received. | 11-05-2015 |
Patent application number | Description | Published |
20090150406 | METHOD AND SYSTEM FOR META-TAGGING MEDIA CONTENT AND DISTRIBUTION - A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site. These same “tagged” words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that will be dropped in real time to identified users and friends of users. | 06-11-2009 |
20120047436 | METHOD AND SYSTEM FOR META-TAGGING MEDIA CONTENT AND DISTRIBUTION - A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site. These same “tagged” words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that will be dropped in real time to identified users and friends of users. | 02-23-2012 |
20120239661 | Method and System for Meta-Tagging Media Content and Distribution - A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site. These same “tagged” words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that are dropped in real time to identified users and friends of users. | 09-20-2012 |
20140059053 | Method and System for Meta-Tagging Media Content and Distribution - A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site. These same “tagged” words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that will be dropped in real time to identified users and friends of users. | 02-27-2014 |
20150356096 | METHOD AND SYSTEM FOR META-TAGGING MEDIA CONTENT AND DISTRIBUTION - A unique application within Video that allows for user generated Meta-tagging to be delivered in real time to individual clips is provided. This meta-tag creates its own tail based upon the user generated words population, which is searchable via a “spider network” that runs invisible behind the web pages of the site. These same “tagged” words are broadcast over various delivery networks including but not limited to live feeds from SMS, MMS, News Feeds within Community Web Sites, Video Sharing Web Sites, Widget applications any other forms of electronic communication that will be dropped in real time to identified users and friends of users. | 12-10-2015 |