Patent application number | Description | Published |
20080235769 | SYSTEM AND METHOD FOR ADAPTIVE TARPITS USING DISTRIBUTED VIRTUAL MACHINES - A system and method for adaptive tarpits using distributed virtual machines. A method in an embodiment may include determining an intrusion prevention strategy in response to a potential attack on a network. Then, based on the intrusion prevention strategy, allocating at least one virtual tarpit in the network, where the at least one virtual tarpit is implemented as a virtual machine, and the adapting the at least one virtual tarpit in the network includes one or more of suspending a virtual tarpit, resuming a suspended virtual tarpit and migrating a virtual tarpit to another virtual machine in the network. Other embodiments are described and claimed. | 09-25-2008 |
20090064293 | METHOD AND APPARATUS FOR A COMMUNITY-BASED TRUST - Machine-readable media, methods, apparatus and system for a community-based trust are provided. In an embodiment, it may be determined whether a requesting node obtains a trust from a targeting node through an endorsement from an intermediate node. If the requesting node obtains the trust through the endorsement from the intermediate node, an intermediate trust level that indicates how much the targeting node trusts the intermediate node may be obtained; and a new trust level that indicates how much the targeting node trusts the requesting node may be calculated based upon the intermediate trust level. | 03-05-2009 |
20090077632 | PROACTIVE NETWORK ATTACK DEMAND MANAGEMENT - Various embodiments described and illustrated herein provide one or more of systems, methods, software, and firmware to handle attack generated demand proactively using distributed virtualization. One goal of some such embodiments is to provide a time window of stable operational response within which an intrusion detection system may detect an attack and/or cause a countermeasure against the attacks to be activated. Demand excursions which are not caused by an attack are supported during the variability of demand providing transparent response to legitimate users of the system. These embodiments, and others, are described in greater detail below. | 03-19-2009 |
20090133096 | MICRO AND MACRO TRUST IN A DECENTRALIZED ENVIRONMENT - A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity. | 05-21-2009 |
20100161926 | Data protection by segmented storage - A device, method, and system are disclosed. In one embodiment the device includes logic to handle and protect data. Specifically, the device includes logic to segment data that can receive a data object that needs to be stored. The logic within the device can segment the data object into a plurality of data segments. A segmented portion of the data object is an incomprehensible portion the data object when viewed in the segmented format. The device can then send each of the data segments to a several different storage locations. | 06-24-2010 |
20100293262 | AUTOMATED SYSTEM MANAGEMENT PROCESS - A method and apparatus for an automated system management process are described. According to an embodiment of the invention, a method comprises receiving data regarding operation of a network; automatically generating network policies based at least in part on the data regarding operation of the network using automation intelligence; applying the network policies to modify operations of the network; and receiving data regarding the operation of the network after the modification of the operations of the network. | 11-18-2010 |
20110153727 | Cloud federation as a service - A Cloud federator may be used to allow seamless and transparent access by a Cloud Client to Cloud services. Federation may be provided on various terms, including as a subscription based real-time online service to Cloud Clients. The Cloud federator may automatically and transparently effect communication between the Cloud Client and Clouds and desired services of the Clouds, and automatically perform identity federation. A Service Abstraction Layer (SAL) may be implemented to simplify Client communication, and Clouds/Cloud services may elect to support the SAL to facilitate federation of their services. | 06-23-2011 |
20120130781 | CLOUD SERVICE INFORMATION OVERLAY - In some embodiments, the invention involves collecting service health information from a plurality of cloud service provider associated with a customer. Once the service health information is collected, aggregating information from multiple providers, when necessary, and providing a service health report to the customer. The customer has agreements with both the service providers and information collector to receive a level of service health information regarding services provided. The information collector may have agreements with the service providers to retrieve or receive the requested service health information for the customers via a pre-agreed upon protocol. Other embodiments are described and claimed. | 05-24-2012 |
20120158578 | HIGHLY GRANULAR CLOUD COMPUTING MARKETPLACE - A system and method may provide for defining a usage policy for an available resource of a personal computing system, and transmitting the usage policy to a market broker. The market broker may identify a match between the usage policy and a request from another computing system, and generate a notification of the match. In addition, funds may be transferred from an account associated with the other computing system to an account associated with the personal computing system based on a remote usage of the available resource by the other computing system. | 06-21-2012 |
20120158967 | VIRTUAL CORE ABSTRACTION FOR CLOUD COMPUTING - A system and method provide for mapping a virtual core of a computing system to an external computing resource and intercepting an instruction directed from an application resident on the computing system to the virtual core. The intercepted instruction may be sent to the external computing resource for processing. | 06-21-2012 |
20120167081 | Application Service Performance in Cloud Computing - Methods and apparatuses associated with cloud computing are disclosed herein. In embodiments, a method may include receiving, by a service monitor operating on a computing device, performance information associated with services provided by an application service with instances operating on a plurality of virtual machines deployed on a plurality of servers of a computing cloud. The service monitor, in response, may identify one or more requests of the computing cloud to attempt to improve performance of the services provided by the application service. Other embodiments may be disclosed and claimed. | 06-28-2012 |
20120311666 | MICRO AND MACRO TRUST IN A DECENTRALIZED ENVIRONMENT - A method and system are disclosed. In one embodiment the method includes calculating a trust level of a first entity. The first entity has a plurality of components. Each component in the first entity has at least the trust level of the first entity. | 12-06-2012 |
20140006219 | COUNTEROFFER GENERATION SERVICE | 01-02-2014 |
20140071273 | Recognition Based Security - Recognition-base security including use of an image capture device to capture images of a visiting individual. An image analysis agent coupled with the image capture device to receive a captured image, to compare characteristics of the captured image to stored characteristics of visitor profiles, to transmit an indication of a match between the captured image and one of the visitor profiles to a user associated with a building visited by the visiting individual. A security response agent coupled with the image analysis agent and the electronic system to generate a policy-determined response to the visiting individual based on the identity. The policy-determined response comprises providing a signaling response to the user and/or the visiting individual. | 03-13-2014 |
20140090008 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 03-27-2014 |
20140090009 | SECURE DATA CONTAINER FOR WEB APPLICATIONS - Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a determination may be made as to whether to permit the attempt based on a context-based security policy. In one example, the context-based security policy is obtained from one or more of a user profile, a multi-user data source and a cloud service. | 03-27-2014 |
20140090066 | SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS - Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform. | 03-27-2014 |
20140096241 | CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION - A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation. | 04-03-2014 |
20140108320 | PREFERENCE PREDICTION TOOL - In accordance with some embodiments of the present invention, information about a user's activities and habits may be collected on an ongoing basis with the user's permission. This information about previous history can then tied to inferences that enable predictions about the user's preferences. As a result, when it comes time for the user to make a decision or a selection, information about past history and permissible inferences can be used to automatically provide suggestions for implementing future activities. In addition, in some cases this previous history information can be used to optimize future selections. | 04-17-2014 |
20140130187 | Protecting Systems from Unauthorized Access to System Resources Using Browser Independent Web Page Technology - In some embodiments, a filter may filter web graphics library code executing on the graphics processing unit. As a result the web graphics library code may be prevented from accessing memory or other resources that are not allocated specifically for the web graphics library module. Likewise web graphics library code may not access any shared resources that have been explicitly assigned to the process specific web graphics library module. | 05-08-2014 |
20140149257 | Customized Shopping - An embodiment of the invention includes a network-accessible compute node, which includes a local storage storing reference images. Each reference image can depict one or more preferences, which can include a quality, a feature, a characteristic, an attribute, a type, and/or a form. Each preference can be associated with a distinctive pattern and a preference criterion. An embodiment includes an optimization module. The optimization module can learn the distinctive patterns from the reference images. The optimization module can also access a remote storage storing images of commodities and use pattern recognition to identify, from the remote storage, one or more images of commodities meeting the preference criterion selected by a user. Other embodiments are described and claimed. | 05-29-2014 |
20140173089 | CLOUD DATA STORAGE LOCATION MONITORING - Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed. | 06-19-2014 |
20140188658 | AUTO DISPLAY OF A PRODUCT LOCATION MAP ON A MOBILE DEVICE BASED ON DEVICE CONTEXT - Generally, this disclosure describes a method and system for providing product mapping on a mobile device based on device context. A method may include receiving product location data based on a context of a mobile device, wherein the product location data includes an available product location for each available product that corresponds to a desired product in a shopping list of desired products; and displaying a map of a store that sells one or more available products, wherein the store is related to the context and the map includes a product location indicator corresponding to each available product location configured to allow a user to find each available product that corresponds to a respective desired product in the store. | 07-03-2014 |
20140189778 | WEB APPLICATION CONTAINER FOR CLIENT-LEVEL RUNTIME CONTROL - Technologies for establishing client-level web application runtime control using a computing device include receiving application code for a browser-based application from a web server and generating machine-executable code and an access control map for the application code. The computing device receives application security information associated with the application code from local and/or remote security applications and performs a security assessment of the application code based on the application security information and the access control map. Further, the computing device establishes a runtime security policy for the browser-based application and enforces that policy. | 07-03-2014 |
20140214673 | METHOD FOR AUTHENTICATION USING BIOMETRIC DATA FOR MOBILE DEVICE E-COMMERCE TRANSACTIONS - Generally, this disclosure describes authentication using biometric data for mobile device e-commerce transactions. A method may include capturing a mobile device user's biometric data; comparing the captured biometric data to authorized user biometric data stored on the mobile device; and authenticating an e-commerce transaction if the captured biometric data corresponds to the authorized user biometric data stored on the mobile device. | 07-31-2014 |
20140259130 | SECURITY CHALLENGE ASSISTED PASSWORD PROXY - Systems, apparatus, and methods of authentication utilizing contextual data to authenticate individuals and prevent security breaches are described herein. An example proxy engine may monitor interactions with a computing device to obtain contextual data unique to a user. The contextual data may be utilized to generate unique challenge questions in response to requests for access to a secure resource, and may eliminate the need for a user to remember credentials to access the resource. Challenge questions may be limited to a single use and vary in difficulty in proportion to the value of the resource. In response to correct responses to challenge question(s), the proxy engine may access a vault containing a credential authorizing access to the resource. The vault and proxy engine may be entirely contained on the computing device or they may be implemented on a remote apparatus accessed via an application or interface on the computing device. | 09-11-2014 |
20140283105 | METHOD AND SERVICE FOR USER TRANSPARENT CERTIFICATE VERIFICATIONS FOR WEB MASHUPS AND OTHER COMPOSITE APPLICATIONS - Embodiments for providing user transparent certificate verifications for web mashups and other composite applications are generally described herein. In some embodiments, a content buffer is provided for holding content until receiving verification results that allow the content to be presented in a browser user interface. A browser core receives an aggregation of content from a plurality of sources and performing local verification of digital certificates associated with the content received form the plurality of sources. A browser content interface intercepts content associated with verified digital certificates from the browser core to provide content associated with verified digital certificates to the content buffer for holding. An online certification module is arranged to receive untrusted certificates from the browser content interface and to perform verification of the received untrusted certificates using online certification services and/or local certificate store on the client device. | 09-18-2014 |
20140316919 | AUTOMATED SECURE CHECK-OUT AND DROP-OFF RETURN OF PRODUCTS USING MOBILE DEVICE - Generally, this disclosure describes a method and system for automated check-out and drop-off return of products using a mobile device. A method may include purchasing at least one product of a plurality of products wherein each product is located at a respective associated product location in a store that sells the plurality of products and a point of sale of each purchased product corresponds to the respective associated product location. | 10-23-2014 |
20140325638 | COMPUTING DEVICE SECURITY - Techniques for providing security for a computing device are described herein. In one example, a maintenance issue for the computing device is detected. Additionally: a maintenance credential proximate the computing: device can be detected. Furthermore, an alarm system within the computing device can be disabled in response to detecting an authorized maintenance credential. | 10-30-2014 |
20140337466 | PERSONA MANAGER FOR NETWORK COMMUNICATIONS - A device for communicating via a network includes a processor, a memory containing persona instructions to cause the processor to obtain one of multiple persona profiles for use while communicating via the network, each persona profile controlling access to personal information of a user tailored to the type of communications being performed. A communication mechanism couples the network to perform communications between the device and the network using the obtained persona profile to share limited personal information. | 11-13-2014 |
20150026764 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 01-22-2015 |
20150058629 | Processing Data Privately in the Cloud - While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data. | 02-26-2015 |
20150086949 | USING USER MOOD AND CONTEXT TO ADVISE USER - Various systems and methods for using a user's mood and context to advise a user are described herein. Data may be received at a mobile device, the mobile device associated with the user. A mood of the user is determined based on the data. An event involving the user is identified and advice is provided to the user regarding the event, the advice based on the received data, the mood, and the event. | 03-26-2015 |