Abstract:
A method and system for graphical enumeration. The method includes creating an ordered set of vertices for a graph such that each vertex is associated with a corresponding index, and wherein each vertex in the ordered set of vertices includes information. A plurality of keys is created for defining the information. A plurality of lists of vertices is created, each of which is associated with a corresponding key such that vertices in a corresponding list include information associated with the corresponding key. For a first list of vertices, a least valued index is determined from a group of associated vertices based on vertices in the first list and vertices pointed to by the vertices in the first list. Also, all associated vertices are pointed to a root vertex associated with the least valued index.
Abstract:
A method for providing an online reputation is disclosed. An online credential service assigns a unique client identifier to each user and a unique forum identifier to each forum that users participate. A user participating in one or more online forums registers for establishing a reputation profile at the online credential service. A unique verification code associated with each forum is generated for the user to include in the user's profile at the corresponding forum. A user's reputation is determined based on whether a verification code is included in the user's profile at the form.
Abstract:
A method for providing an online reputation is disclosed. An online credential service assigns a unique client identifier to each user and a unique forum identifier to each forum that users participate. A user participating in one or more online forums registers for establishing a reputation profile at the online credential service. A unique verification code associated with each forum is generated for the user to include in the user's profile at the corresponding forum. A user's reputation is determined based on whether a verification code is included in the user's profile at the form.
Abstract:
A system and method for providing, as a service over a computer network (especially a packet-switched computer network) to a body of merchants connected to the computer network, verification of consumer identification based on data provided over the computer network by scanning devices attached to the computers operated by consumers.
Abstract:
A system establishes virtual DNS servers that are supported by a DNS server. Target IP addresses are assigned for the virtual DNS servers. Network capable devices are uniquely assigned to the virtual DNS servers for domain name resolution. Each network capable device accesses the communication network through a corresponding network device associated with a corresponding source IP address. A client's service plan is assigned to a first network capable device used by the client. The service plan is implemented through a DNS request under a session established between the first network capable device and its assigned first virtual DNS server. The session is uniquely identified by a first source IP address of a first network device used by the first network capable device to access the communication network and a first target IP address of the first virtual DNS server.
Abstract:
A method and system for graphical enumeration. The method includes creating an ordered set of vertices for a graph such that each vertex is associated with a corresponding index, and wherein each vertex in the ordered set of vertices includes information. A plurality of keys is created for defining the information. A plurality of lists of vertices is created, each of which is associated with a corresponding key such that vertices in a corresponding list include information associated with the corresponding key. For a first list of vertices, a least valued index is determined from a group of associated vertices based on vertices in the first list and vertices pointed to by the vertices in the first list. Also, all associated vertices are pointed to a root vertex associated with the least valued index.
Abstract:
Actuation of character keys on a typewriter produce coded pulses that are converted into binary numbers by a programmable memory, representing variations of basic linear widths in accordance with selected printing type styles. The binary number output of the memory controls a pair of counters through a gating section to display a numeric readout representing the accumulated linear width of type of selected height corresponding to the character keys actuated.
Abstract:
Various aspects involve determining legitimacy of an email address for risk assessment or other purposes. For instance, a risk assessment computing system receives a risk assessment query that identifies an email address. The risk assessment computing system determines a set of features for the email address. For each feature, the risk assessment computing system calculates an illegitimacy score by calculating a deviation of the feature from an expected safe value for the feature that is determined from historical email addresses. The risk assessment computing system aggregates the illegitimacy scores of the plurality of features into an aggregated illegitimacy score and further transmits a legitimacy risk value to a remote computing system. The legitimacy risk value indicates the aggregated illegitimacy score and can be used in controlling access of a computing device associated with the email address to one or more interactive computing environments.
Abstract:
A method described herein involves various operations directed toward network security. The operations include accessing a traffic attribute describing a feature of network traffic. The operations further include determining a baseline distribution for the traffic attribute of a baseline set of transactions involving an online system over a baseline period and, additionally, determining an observed distribution for the traffic attribute of an observed set of transactions involving the online system over an observed period. Using the observed distribution and the baseline distribution, an attribute risk value for the traffic attribute is computed. The operations further include detecting that an anomaly exists in the traffic attribute of the observed set of transactions, based on the attribute risk value. Responsive to detecting the anomaly, an access control is implemented for access to the online system by additional transactions having a particular value in the traffic attribute meeting a pattern of the anomaly.
Abstract:
System and methods track events associated with web browser activity along with corresponding browser tab identifiers. A web page is loaded in a browser tab based on a request to a Uniform Resource Locator (URL). A time is identified, and it is determined that a predetermined time interval has elapsed. A storage mechanism is queried to determine whether an event log stored to the storage mechanism contains a stored tab identifier for the browser tab. If the tab identifier is not stored to the event log, then a tab identifier is stored to the event log, mapped to the time and the URL. If the event log contains the stored tab identifier for the tab, then the event log is updated to include the time mapped to the tab identifier. The URL may also be updated if applicable. The event log is transmitted to a server computer for further analysis.