Distributing keys for decrypting client data
    11.
    发明授权
    Distributing keys for decrypting client data 有权
    分发用于解密客户端数据的密钥

    公开(公告)号:US09215064B2

    公开(公告)日:2015-12-15

    申请号:US14058460

    申请日:2013-10-21

    CPC classification number: H04L9/0819 H04L9/0861

    Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.

    Abstract translation: 在一些实施例中,服务器可以与远程客户端建立会话。 服务器可以生成会话的会话密钥部分和用于远程客户端的客户端密钥部分。 服务器可以使用组合加密密钥来加密在会话期间从远程客户端接收的客户端数据。 可以从由服务器,会话密钥部分和客户端密钥部分可访问的静态密钥部分生成组合的加密密钥。 服务器可以将会话密钥部分与会话相关联。 会话密钥部分在会话期间由服务器访问。 服务器可以在将客户机密钥部分提供给远程客户端之后删除客户端密钥部分。 响应于确定会话期间的后续事务涉及解密加密的客户端数据,服务器可以从远程客户机获得客户端密钥部分。

    Facilitating Analysis of User Interface Gesture Patterns

    公开(公告)号:US20180253224A1

    公开(公告)日:2018-09-06

    申请号:US15448371

    申请日:2017-03-02

    CPC classification number: G06F3/04883 G06F9/451 G06K9/00409 G06K9/6232

    Abstract: Facilitating analysis of user interface gesture patterns is described. In example implementations, a computing device acquires data that describes a user interface gesture pattern, such as finger movements on a touchscreen, in terms of pixels of a visual display. A repetitive arrangement of polygons, such as a grid of rectangles, is logically overlaid on the visual display. The computing device transforms the pixel-based data into polygon-based data that represents the gesture pattern in terms of polygons traversed by the gesture pattern. The computing device also converts the polygon-based data into text-based data such that the gesture pattern is represented by textual characters, such as a text string. The text string can include, for instance, a list of polygons traversed by the gesture pattern. The text-based data is forwarded to a service that can efficiently analyze relationships that may exist among multiple gesture patterns across multiple devices or end users.

    Platform to Create and Disseminate Virtual User Experiences

    公开(公告)号:US20180059898A1

    公开(公告)日:2018-03-01

    申请号:US15246137

    申请日:2016-08-24

    CPC classification number: G06Q30/0275 G06F3/011 H04L67/12 H04L67/38

    Abstract: Techniques and systems are described to implement a platform to create and disseminate virtual user experiences. In one example, a service provider exposes a platform usable for creation of virtual user experiences. In another example, a service provider exposes functionality to enable specification of physical environment conditions to be met in order to cause dissemination of respective virtual user experiences maintained by the service provider. In one instance, triggers are detected by a computing device of a user that are indicative of a likelihood to cause output of a virtual user experience. Once triggered, the computing device communicates data describing physical environment conditions to the service provider. The service provider then matches these conditions to specified physical environment conditions that are to be used to control dissemination of the virtual user experience.

    Navigation and Rewards involving Physical Goods and Services

    公开(公告)号:US20180053236A1

    公开(公告)日:2018-02-22

    申请号:US15238374

    申请日:2016-08-16

    CPC classification number: G06Q30/0631 G06Q30/0633 G06Q30/0639

    Abstract: Navigation and reward techniques involving physical goods and services are described. In one example, digital content is configured to aid navigation of a user between different physical goods or services. This navigation includes user specified good or services as well as recommended goods or services that are not specified by the user. In another example, digital content is provided as part of a reward system. In return for permitting access to user data, the user is provided with rewards that are based on this monitored interaction. In this way, an owner of the store may gain detailed knowledge which may be used to increase likelihood of offering goods or services of interest to the user. In return, the user is provided with rewards to permit access to this detailed knowledge.

    Facilitating Location-Aware Analysis
    18.
    发明申请

    公开(公告)号:US20180025028A1

    公开(公告)日:2018-01-25

    申请号:US15217592

    申请日:2016-07-22

    CPC classification number: G06F17/30241 G06F17/30289 G06F17/3087

    Abstract: Facilitating location-aware analysis is described. In some embodiments, a database building module is configured to build a point of interest (POI) database based on a tree data structure that includes multiple nodes respectively corresponding to multiple areas. The database building module includes a content node processing module that inserts an entry in the POI database having a content field populated by a POI descriptor included with a content node. The database building module also includes a reference node processing module that inserts an entry having multiple reference fields respectively populated with area indicators corresponding to multiple subnodes of a reference node. In other embodiments, a POI database search module is configured to search a POI database to ascertain multiple POIs with regard to a location of a computing device. The search module searches key fields of reference entries and content entries using an area indicator matching the computing device's location.

    Distributing keys for decrypting client data

    公开(公告)号:US09749130B2

    公开(公告)日:2017-08-29

    申请号:US14939308

    申请日:2015-11-12

    CPC classification number: H04L9/0819 H04L9/0861

    Abstract: In some embodiments, a server can establish a session with a remote client. The server can generate a session key portion for the session and a client key portion for the remote client. The server can use a combined encryption key to encrypt client data received from the remote client during the session. The combined encryption key can be generated from a static key portion accessible by the server, the session key portion, and the client key portion. The server can associate the session key portion with the session. The session key portion is accessible by the server during the session. The server can delete the client key portion after providing the client key portion to the remote client. The server can obtain the client key portion from the remote client in response to determining that subsequent transactions during the session involve decrypting the encrypted client data.

    Internet of things datapoint engine

    公开(公告)号:US09742740B2

    公开(公告)日:2017-08-22

    申请号:US14944801

    申请日:2015-11-18

    Abstract: Techniques allow owners of Internet of Things (IoT) devices to provide specific access to data from their IoT devices to requesters of data. A request for data from one or more IoT devices is received from one or more requesters, and the request is provided to the owner of the one or more IoT devices. An indication of acceptance by the owner is provided for at least one of the requests from the requesters. A public key of a public/private key pair associated with each of the accepted requester(s) is received. A plurality of datapoints from the one or more IoT devices is also received. For each of the selected requester(s), at least one datapoint of the plurality of datapoints is encrypted with the public key of the requester. The encrypted at least one datapoint is then sent to the requester, where the requester can decrypt the encrypted at least one datapoint using the private key of the public/private key pair.

Patent Agency Ranking