Patent application number | Description | Published |
20100315440 | ADAPTIVE VIEWING OF REMOTE DOCUMENTS ON MOBILE DEVICES - Embodiments of the invention provide adaptive viewing of a page on mobile electronic devices with a small screen size and/or limited connectivity. Embodiments of the invention enable a user to more easily and quickly download and view a page on a small display screen, such as a display screen of a mobile electronic device. Embodiments of the invention determine an initial portion of a page for download and transmission as well as a sequential order of page portions for subsequent download and transmission to a mobile electronic device. | 12-16-2010 |
20110179115 | Sharing of Documents with Semantic Adaptation Across Mobile Devices - A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action. | 07-21-2011 |
20120331060 | Sharing of Documents with Semantic Adaptation Across Mobile Devices - A method for sharing documents includes initiating a sharing session with a first participant and a second participant, wherein the first participant is communicatively connected to the second participant via a server, receiving a control request having an action from the first participant, determining whether the control request includes a share page action, and retrieving components of the page with available component types and sending components associated with preferences of the first participant to the first participant and components associated with preferences of the second participant to the second participant responsive to determining that the control request includes the share page action. | 12-27-2012 |
20140137203 | AUTOMATICALLY GENERATING CHALLENGE QUESTIONS INFERRED FROM USER HISTORY DATA FOR USER AUTHENTICATION - User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response. | 05-15-2014 |
20140137219 | AUTOMATICALLY GENERATING CHALLENGE QUESTIONS INFERRED FROM USER HISTORY DATA FOR USER AUTHENTICATION - User authentication is provided. At least one of a social network and a business network of each user in a plurality of users is accessed. User history data of each user in the plurality of users is monitored in the at least one of the social network and the business network. Challenge questions requiring a user response are generated based on monitoring the user history data of the users. The user response to a generated challenge question is evaluated. A set of events is triggered based on evaluating the user response. | 05-15-2014 |
20140137239 | Application-Level Anomaly Detection - An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed. | 05-15-2014 |
20140137246 | Application-Level Anomaly Detection - An example includes intercepting one or more activities performed by an application on a computing device. The intercepting uses an instrumentation layer separating the application from an operating system on the computing device. The one or more activities are compared with one or more anomaly detection policies in a policy configuration file to detect or not detect presence of one or more anomalies. In response to the comparison detecting presence of one or more anomalies, indication(s) of the one or more anomalies are stored. Another example includes receiving indication(s) of anomaly(ies) experienced by an application on computing device(s) and analyzing the indication(s) of the anomaly(ies) to determine whether corrective action(s) should be issued. Responsive to a determination corrective action(s) should be issued based on the analyzing, the corrective action(s) are issued to the computing device(s). Methods, program products, and apparatus are disclosed. | 05-15-2014 |
20140150071 | SOCIAL AUTHENTICATION OF USERS - User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource. | 05-29-2014 |
20140150072 | SOCIAL AUTHENTICATION OF USERS - User authentication is provided. A social network associated with a user of a client device is monitored to determine whether a set of designated users are currently logged in and authenticated to access a secure resource. A video connection is established between the user of the client device and the set of designated users that are currently logged in and authenticated to access the secure resource. In addition, an authentication request screen is sent showing captured video authentication data corresponding to the user of the client device to the set of designated users that are currently logged in and authenticated to access the secure resource. | 05-29-2014 |
20140181023 | Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications - A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed. | 06-26-2014 |
20140181025 | Transparent Data Service Suitable For Modifying Data Storage Capabilities In Applications - A method includes monitoring, on a computing device, data events corresponding to manipulation of data by an application. The monitoring is performed by a data library service that is embedded in the application. The method includes, in response to the monitoring indicating first data on the computing device is modified by the application, synchronizing, by the computing device under control at least in part of the data library service, second data stored on one or more storage providers in a network with the first data modified by the application and stored on the computing device. Apparatus and computer program products are also disclosed. | 06-26-2014 |
20140189785 | SOCIAL AND PROXIMITY BASED ACCESS CONTROL FOR MOBILE APPLICATIONS - Methods and systems for proximity-based access control include determining whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; determining whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold with a processor; and activating a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device. | 07-03-2014 |
20140189786 | SOCIAL AND PROXIMITY BASED ACCESS CONTROL FOR MOBILE APPLICATIONS - Systems for proximity-based access control include a proximity module configured to determine whether a distance from a first mobile device to each of one or more safe mobile devices falls below a threshold distance; a policy engine comprising a processor configured to determine whether a number of safe mobile devices within the threshold distance exceeds a safe gathering threshold; and a security module configured to activate a safe gathering policy in accordance with the safe gathering threshold that decreases a security level in the first mobile device. | 07-03-2014 |
20140222994 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - Methods and systems for enabling an application to track provenance information include analyzing an application binary to discover injection points for provenance tracking code; overwriting instructions in the application binary at the injection points to create an instrumented application, where the overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations; and deploying the instrumented application on a client device. | 08-07-2014 |
20140223000 | TRANSPARENTLY TRACKING PROVENANCE INFORMATION IN DISTRIBUTED DATA SYSTEMS - Systems for enabling an application to track provenance include an application analysis module configured to analyze an application binary to discover injection points for provenance tracking code; and an instruction alteration module configured to overwrite instructions in the application binary at the injection points to create an instrumented application. The overwritten instructions link the application binary to one or more instrumented libraries that invoke a provenance layer to track data operations. | 08-07-2014 |
20140298476 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAMS FOR SECURELY USING PUBLIC SERVICES FOR PRIVATE OR ENTERPRISE PURPOSES - A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data. | 10-02-2014 |
20140298477 | SYSTEM, METHOD, APPARATUS AND COMPUTER PROGRAMS FOR SECURELY USING PUBLIC SERVICES FOR PRIVATE OR ENTERPRISE PURPOSES - A method, system, apparatus and computer programs are disclosed to process content for an enterprise. The method includes reviewing, using at least one enterprise policy, content that is to be sent through a data communications network to a public service to determine if the content comprises secure data and, in response to identifying secure data, modifying the content to be sent to the public service such that a presence of secure data will be visually imperceptible when the content is rendered at the public service. The step of modifying can include steganographically embedding the secure data or a link to the secure data in a container such as image data. | 10-02-2014 |