摘要:
In some embodiments, a technique for providing location-based functionality comprises providing functionality, wherein the functionality uses information provided by a location-aware device.
摘要:
Analyzing routing information to identify and intercept unauthorized, unwanted, and/or otherwise malicious communications is disclosed. In some embodiments, routing information associated with a message currently being processed is checked against corresponding information associated with a message from the same source that was processed previously. In some embodiments, a message processing system that handled and/or otherwise has access to routing information for both messages performs the check, such as a network messaging and/or access service provider with which the sender is associated, performs the check. If the routing information for the current message does not match the corresponding information observed in the previous message, responsive action is taken. Using routing information to determine whether a source of an infected message should be notified is disclosed. In some embodiments, if routing information for a prior message from the source of an infected message is similar to corresponding information for the infected message, the source is notified.
摘要:
In some embodiments, a technique for providing location-based functionality comprises providing functionality, wherein the functionality uses information provided by a location-aware device.
摘要:
In some embodiments, a technique for processing a message comprises receiving a message; classifying the message into one of a plurality of categories, wherein the classification includes using content-based message analysis; and challenging the message if the message is classified into a first category.
摘要:
In some embodiments, techniques for searching comprise providing a user interface, wherein the user interface is associated with an input area and a selector, receiving a search term and a desired category simultaneously, wherein the search term is associated with the input area and the category is associated with the selector, determining a plurality of documents, wherein each of the plurality of documents is associated with the search term and the category, and providing a search result, wherein the search result is associated with the plurality of documents.
摘要:
Establishing trust according to historical usage of selected hardware involves providing a usage history for a selected client device; and extending trust to a selected user based on the user's usage history of the client device. The usage history is embodied as signed statements issued by a third party or an authentication server. The issued statement is stored either on the client device, or on an authentication server. The usage history is updated every time a user is authenticated from the selected client device. By combining the usage history with conventional user authentication, an enhanced trust level is readily established. The enhanced, hardware-based trust provided by logging on from a trusted client may eliminate the necessity of requiring secondary authentication for e-commerce and financial services transactions, and may also be used to facilitate password recovery and conflict resolution in the case of stolen passwords.
摘要:
A method for selecting a performance optimization level for program code segments (e.g., JavaScript code) embedded in interactive webpages according to the origin (e.g., domain) of the webpages is disclosed. The information on historic usage behavior on webpages from the same origin is collected. The historic usage behavior can be specific to the current user or an average or aggregated behavior across many users who have visited webpages from the same origin. The historic usage information is used to select an appropriate level of optimization to achieve the maximum performance improvement for the least amount of compilation cost. The selected optimization level can be adjusted over time based on a measure of actual performance improvement resulted from the different levels of optimization that had been carried out during prior visits.
摘要:
In some embodiments, techniques may include receiving an email message; determining a non-recipient email addressee associated with the email message, wherein the non-recipient email addressee has an address that is unaffiliated with a recipient for which the email message has been received; receiving a directive to whitelist the non-recipient email addressee; and responsive to receiving the directive to whitelist the non-recipient email addressee, adding the non-recipient email addressee to a whitelist.
摘要:
Personalizing communications for a first communication platform includes accessing status information for communication sessions by a communication identity that leverage a first communication platform other than an instant messaging platform. A participant list associated with the communication identity and the first communication platform is passively configured to persistently reflect a list of participant identities from communication sessions in which the communication identity recently participated using the communication platform.