Patent application number | Description | Published |
20080235769 | SYSTEM AND METHOD FOR ADAPTIVE TARPITS USING DISTRIBUTED VIRTUAL MACHINES - A system and method for adaptive tarpits using distributed virtual machines. A method in an embodiment may include determining an intrusion prevention strategy in response to a potential attack on a network. Then, based on the intrusion prevention strategy, allocating at least one virtual tarpit in the network, where the at least one virtual tarpit is implemented as a virtual machine, and the adapting the at least one virtual tarpit in the network includes one or more of suspending a virtual tarpit, resuming a suspended virtual tarpit and migrating a virtual tarpit to another virtual machine in the network. Other embodiments are described and claimed. | 09-25-2008 |
20110078758 | METHOD AND DEVICE FOR CONTROLLING USE OF CONTEXT INFORMATION OF A USER - A method and device for controlling use of context information of a user includes establishing a context policy enforcement engine on a mobile computing device. The context policy enforcement engine may be embodied as software and/or hardware components. The context policy enforcement engine retrieves context policy data in response to receiving a request for context information related to a user. The context policy data defines a set of context rules for responding to context requests. The context policy enforcement engine responds to the request based on the set of context rules. | 03-31-2011 |
20110148633 | USING TRAJECTORY FOR AUTHENTICATION - An authentication system authenticates a device based on a detected trajectory of that device within a physical environment. The device includes a wireless transmitter that communicates with sensors distributed throughout the environment. As the device moves throughout the environment, the sensors send location information to an authentication system. The authentication system tracks the trajectory or dynamic location of the device and authenticates the device based on whether the observed trajectory of the device conforms with a predicted trajectory or behavior. | 06-23-2011 |
20110161848 | METHOD AND DEVICE FOR MANAGING SECURITY EVENTS - A method and device for managing security events includes establishing a security event manager on a mobile computing device. The security event manager may be embodied as software and/or hardware components. The security event manager receives security event data from a plurality of security event sources of the mobile computing device and correlates the security event data based on a security policy to determine whether a security event has occurred. The security event manager responds to the security event based on the security policy. | 06-30-2011 |
20120174214 | ENHANCING BIOMETRIC SECURITY OF A SYSTEM - In one embodiment, a method includes receiving an ordered sequence of biometric inputs from a user via a biometric sensor, determining if each of the ordered sequence matches a corresponding entry stored in a table that includes a stored ordered sequence of biometric inputs corresponding to a password pattern of the user, and if so, enabling the user to access the processing system, otherwise preventing the user from accessing the processing system. Other embodiments are described and claimed. | 07-05-2012 |
20120311695 | METHOD AND APPARATUS FOR DYNAMIC MODIFICATION OF AUTHENTICATION REQUIREMENTS OF A PROCESSING SYSTEM - Authentication requirements for a user to access a processing system may be dynamically modified based on status information received from sensors coupled to the processing system. The processing system may receive a request for access to the processing system by the user. The processing system determines an authentication policy based at least in part on the status information, and presents authentication requirements to the user based at least in part on the authentication policy. | 12-06-2012 |
20140004834 | SYSTEM AND METHOD FOR GESTURE-BASED MANAGEMENT | 01-02-2014 |
20140006219 | COUNTEROFFER GENERATION SERVICE | 01-02-2014 |
20140006588 | CONTEXT-DRIVEN LOCAL NETWORK SERVICES | 01-02-2014 |
20140089863 | SYSTEMS, METHODS, AND COMPUTER PROGRAM PRODUCTS FOR GESTURE-BASED SEARCH AND DISCOVERY THROUGH A TOUCHSCREEN INTERFACE - A touchscreen-based user interface that allows the user to perform information searching on a mobile information appliance, such as a tablet computer or smart phone. By moving one or two fingers in appropriate direction(s) across the touchscreen, a search may be specified. Moreover, by using the appropriate gestures, a search may be broadened or narrowed by specifying additional search terms. This may be performed iteratively to allow the user to discover information, at various times narrowing or broadening a search. | 03-27-2014 |
20140090008 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 03-27-2014 |
20140090009 | SECURE DATA CONTAINER FOR WEB APPLICATIONS - Systems and methods may provide for identifying web content and detecting an attempt by the web content to access a local data store. Additionally, a determination may be made as to whether to permit the attempt based on a context-based security policy. In one example, the context-based security policy is obtained from one or more of a user profile, a multi-user data source and a cloud service. | 03-27-2014 |
20140090066 | SECURITY DATA AGGREGATION AND BUSINESS INTELLIGENCE FOR WEB APPLICATIONS - Systems and methods may provide for detecting a browser request for web content. Additionally, interaction information associated with a plurality of sources may be determined in response to the browser request, and a risk profile may be generated based on the interaction. The risk profile may include at least a portion of the interaction information as well as recommended control actions to mitigate the identified risk. In one example, the risk profile is presented to a user associated with the browser request as well as to a security control module associated with the platform. | 03-27-2014 |
20140095943 | PREDICTIVE PRECACHING OF DATA BASED ON CONTEXT - A device and method for predictively precaching content on a mobile communication device includes monitoring numerous data sources for contextual data on the activities of the user. The mobile communication device predicts network connectivity outages and affected applications using the contextual data. The mobile communication device notifies the affected applications of the predicted network connectivity outage, and in response the affected applications precache suitable content. The affected applications may employ several precaching strategies in response to the notification, such as downloading content from a remote content server, adjusting content streaming, or adjusting content buffering prior to the predicted network connectivity outage. During the network outage, application service is provided using the precached content. Such precaching may also be accomplished using a local caching proxy server. | 04-03-2014 |
20140134972 | Embedding Service Provider Information In A Wireless Call - In one embodiment, a method includes receiving, in a mobile station of a terminating party, an incoming call and an identifier of a service provider of an initiating party of the incoming call, and displaying information corresponding to the initiating party service provider on a display of the mobile station. Other embodiments are described and claimed. | 05-15-2014 |
20140172828 | PERSONALIZED SEARCH LIBRARY BASED ON CONTINUAL CONCEPT CORRELATION - A system, devices, and methods for providing a personalized search library based on continual concept correlation include a client computing device and a personalized content server. Content events representing content accessed or manipulated by a user of the client computing device are continually generated. Content associated with the content events is continually parsed and analyzed to extract main concepts. The extracted concepts are correlated and weighted into a concept model, based on the order of the content events. The concept model parallels the structure of the user's memory. Data sources are continually searched for content relevant to a current context of the concept model. Relevant content is indexed according to the concept model. The relevant content may be made available to the user upon request or proactively. Relevant content may be cached for future use by the user. Other embodiments are described and claimed. | 06-19-2014 |
20140197948 | AUTONOMOUS AGGREGATED SEARCH PLATFORM AND METHODS USING THE SAME - Systems and methods for searching for lost moving objects such as children are disclosed. In some embodiments, the systems and methods initiate an autonomous, expanding electronic search by emitting a search activation signal from a search initiation device. The search activation signal may include the target tag identifier of a target tag conveyed by the moving object. Search devices detecting the target tag may generate a hit signal, which may be used to determine the location of the target tag. In some instances, focused human searching for the moving object may be initiated based on this determined location, and/or on location information included in one or more hit signals. | 07-17-2014 |
20140200025 | LOCATION DISCREPANCY CORRECTIONS BASED ON COMMUNITY CORRECTIONS AND TRAJECTORY DETECTION - Generally, this disclosure describes location discrepancy fixes using a community of users. A method may include correcting a location of a mobile device when a location signal is lost based on a last known location and a trajectory, wherein a corrected location corresponds to an actual location provided by at least one user of a community of users and stored in a list of corrected locations, and the actual location is related to the last known location and the trajectory. | 07-17-2014 |
20140214673 | METHOD FOR AUTHENTICATION USING BIOMETRIC DATA FOR MOBILE DEVICE E-COMMERCE TRANSACTIONS - Generally, this disclosure describes authentication using biometric data for mobile device e-commerce transactions. A method may include capturing a mobile device user's biometric data; comparing the captured biometric data to authorized user biometric data stored on the mobile device; and authenticating an e-commerce transaction if the captured biometric data corresponds to the authorized user biometric data stored on the mobile device. | 07-31-2014 |
20140221003 | PEER-BASED COLLABORATIVE DISCOVERY AND SIGNALING OF ANOTHER DEVICE IN LIMITED-SIGNAL AREAS - Generally, this disclosure describes a method and system for peer-based collaborative discovery and signaling of another device in limited signal areas. A method may include, in an embodiment, initiating a sensing mode in a seek mobile device in response to receiving an indication that a location of a lost mobile device is unknown; capturing first position data if a signal from the lost device is detected; capturing second position data in response to losing the signal from the lost device; and determining an estimated location of the lost device based on the first position data and the second position data, wherein the lost device is located in an area of limited or no connectivity and the seek device is moving through the area. | 08-07-2014 |
20140222330 | INTEGRATION OF CONTEXTUAL AND HISTORICAL DATA INTO ROUTE DETERMINATION - Generally, this disclosure describes a method and system for route personalization. A method may include, in an embodiment, requesting that a user of a computing device provide a trip modifier in response to a request from the user to map a route from a first location to a second location; acquiring objective data related to the trip modifier for at least one possible route from the first location to the second location; generating a weighted route recommendation associated with each possible route based on the acquired objective data and the trip modifier; and displaying each possible route and its associated weighted route recommendation on the computing device, wherein the trip modifier comprises at least one user characteristic and each weighted route recommendation is configured to provide a personalized route recommendation to the user for the respective associated possible route. | 08-07-2014 |
20140250490 | AUTHENTICATING TO A NETWORK VIA A DEVICE-SPECIFIC ONE TIME PASSWORD - Generally, this disclosure describes a method and system for authenticating to a network via a device-specific one-time password. A method in an embodiment may include generating a first one-time password (OTP) based at least in part on a plurality of client device attributes; and providing the first OTP to an authenticator associated with a private network during a first session, wherein the authenticator is configured to authenticate the client device to at least one of the private network and protected content included in the private network for a second session following the first session based on the provided first OTPP. | 09-04-2014 |
20140282679 | DYNAMICALLY IMPLEMENTING AN IMAGE PROTECTION POLICY - Technologies for dynamically implementing an image protection policy include a camera device with a camera to capture an image of at least one person. The camera device determines a location in the image of at least one person in the image, determines a location of at least one personal computing device, and maps the personal computing devices to the persons captured in the image based on the determined device and image locations. The camera device may broadcast an announcement of the creation of the image to the personal computing devices, negotiate an image protection policy with each of the personal computing devices, and implement the negotiated image protection policy. | 09-18-2014 |
20140310525 | METHOD FOR EXCHANGING STRONG ENCRYPTION KEYS BETWEEN DEVICES USING ALTERNATE INPUT METHODS IN WIRELESS PERSONAL AREA NETWORKS (WPAN) - A method for exchanging strong encryption keys between devices using alternate input methods. At least two devices that want to communicate with one another are set in key exchange mode. The at least two devices are to communicate with one another using a short range radio or personal area network. The at least two devices negotiate with one another to determine which of the at least two devices will generate an encryption key, wherein device A represents the negotiated device and device B represents the non-negotiated device. Device A generates the encryption key and transmits the encryption key to device B using an out-of band transmission channel. The out-of-band transmission channel may be transmitting the encryption key via audio tones. A validation process determines whether the transmission of the encryption key via the out-of-band transmission channel was successful. If the encryption key has been successfully validated, the at least two devices are enabled to automatically accept communications between them over the short range radio or personal area network. | 10-16-2014 |
20150026764 | DETECTING, ENFORCING AND CONTROLLING ACCESS PRIVILEGES BASED ON SANDBOX USAGE - Systems and methods may provide for receiving web content and detecting an access control attribute associated with the web content. Additionally, the access control attribute may be monitored for a disablement condition. In one example, the disablement condition may be detected, an access policy may be determined in response to the disablement condition, and the access policy may be implemented. Other embodiments are described and claimed. | 01-22-2015 |