Patent application number | Description | Published |
20090231998 | SELECTIVE FILTERING OF NETWORK TRAFFIC REQUESTS - Several approaches to selectively filtering network traffic are described. One approach involves a system for selectively filtering network traffic. The system includes a helper application, which is coupled to a networking program, and is used to identify a user-initiated request. A network filter driver is coupled to the networking program, for intercepting the user-initiated request. A filtering service is coupled to both the helper application and the network filter driver, and is used to determine if the user-initiated request is allowable. If the request is allowable, the filtering service is configured to generate a special identifier, which the helper application is configured to include in a subsequent request. The filtering service is configured to allow a subsequent request which includes the special identifier, and the network filter driver's configured to strip a special identifier from subsequent requests. | 09-17-2009 |
20100058478 | SOFTWARE ANTI-PIRACY PROTECTION - Licensing aspects of vendor software packages can be protected with reduced user interaction and effort by automating licensing exploit identification, and if allowed, exploit correction. Automating licensing exploit detection ensures that known exploits are more quickly and efficiently discovered to help maintain genuine software status. Minimizing user interaction in licensing exploit detection and correction involves less disruption to users and generally supports increased user satisfaction with vendor software package usage. | 03-04-2010 |
20100299735 | Uniform Resource Locator Redirection - Uniform resource locator (URL) redirection techniques are described. In an implementation, a web browser is redirected from a URL that is blocked to a URL for a web page configured to request authorization to access the URL that is blocked. Selection is accepted of how to request authorization to access the URL that is blocked. | 11-25-2010 |
20110078448 | Short-Lived Certificate Authority Service - An integrated authentication service is described which may receive a bundled request from one or more clients. One or more of the described techniques may be utilized to provide, in response to a single bundled request, a token for proof of identity and a certificate for establishing secure communications. | 03-31-2011 |
20110138179 | Scalable Session Management - Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers. | 06-09-2011 |
20120079585 | PROXY AUTHENTICATION AND INDIRECT CERTIFICATE CHAINING - Embodiments of proxy authentication and indirect certificate chaining are described herein. In an implementation, authentication for a client occurs via a proxy service. Proxy service communicates between client and server, and caches security tokens on behalf of the client. In an implementation, trustworthiness of certificate presented to a client to establish trust is determined utilizing a signed data package which incorporates a plurality of known certificates. The presented certificate is verified without utilizing root certificates installed on the client device. | 03-29-2012 |
20130018964 | MESSAGE CATEGORIZATIONAANM Osipkov; IvanAACI BellevueAAST WAAACO USAAGP Osipkov; Ivan Bellevue WA USAANM Jiang; WeiAACI RedmondAAST WAAACO USAAGP Jiang; Wei Redmond WA USAANM Davis; Malcolm HollisAACI KirklandAAST WAAACO USAAGP Davis; Malcolm Hollis Kirkland WA USAANM Hines; DouglasAACI KenmoreAAST WAAACO USAAGP Hines; Douglas Kenmore WA USAANM Korb; JoshuaAACI IssaquahAAST WAAACO USAAGP Korb; Joshua Issaquah WA US - One or more techniques and/or systems are provided for defining a message behavior profile for a sender, which may be used to categorize messages from the sender. A message behavior profile may be defined based upon, for example, message distribution behavior of the sender (e.g., volume, frequency, variance in content amongst messages sent to recipients, etc.); recipient interactions with messages from the sender (e.g., message read rates, message response rates, etc.); unsubscription options comprised within messages from the sender; and/or other factors. In this way, the message behavior profile and/or features extracted from a message may be used to categorize a message from the sender (e.g., newsletter, commercial advertisements, alert, social network etc.). Categorized messages may be organized into folders, displayed or hidden within views, and/or processed based upon their respective categorizations. | 01-17-2013 |
20130067590 | COMBINING CLIENT AND SERVER CLASSIFIERS TO ACHIEVE BETTER ACCURACY AND PERFORMANCE RESULTS IN WEB PAGE CLASSIFICATION - In one embodiment, an internet monitor service may use a final content rating to determine access to a webpage. A monitor client | 03-14-2013 |
20130086180 | Message Classification and Management - Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account is examined to extract one or more features of the message. A determination is then made as to whether the message corresponds to one or more categories based on the extracted features, the categories usable to enable features to be applied to the message in a user interface. | 04-04-2013 |
20140059354 | Scalable Session Management - Scalable session management is achieved by generating a cookie that includes an encrypted session key and encrypted cookie data. The cookie data is encrypted using the session key. The session key is then signed and encrypted using one or more public/private key pairs. The encrypted session key can be decrypted and verified using the same private/public key pair(s). Once verified, the decrypted session key can then be used to decrypt and verify the encrypted cookie data. A first server having the private/public key pair(s) may generate the cookie using a randomly generated session key. A second server having the same private/public key pair(s) may decrypt and verify the cookie even if the session key is not initially installed on the second server. A session key cache may be used to provide session key lookup to save public/private key operations on the servers. | 02-27-2014 |