摘要:
Whitelists are automatically shared between users and/or domains without compromising user/domain privacy. Potential trust partners with whom to share whitelist data are automatically identified. A handshaking procedure is carried out to confirm the trust relationship and verify the partner's identity. Once a trust partner is confirmed, the parties can exchange acceptance criteria specifying the types of whitelist data they want to receive. Each party can provide the other with the appropriate entries from its own whitelist. The parties keep each other updated, as their own whitelists change.
摘要:
A parent defines friend rules for on-line association with their child. Upon a request of an on-line stranger to be a new friend of the child, stranger information about the on-line stranger is retrieved and compared to the friend rules to determine whether the stranger is allowed, blocked or restricted from being a friend with the child. Accordingly, the parent only has to use a minimal amount of time in establishing the friend rules to protect the parent's child from on-line strangers.
摘要:
A method of automating an authentication sequence for accessing a computer resource comprising processing form information associated with the authentication sequence, wherein the authentication sequence comprises a plurality of queries associated with a plurality of web pages; and communicating a response to a portion of the authentication sequence using form information that corresponds to a query upon recognition of indicia of the portion of the plurality of web pages where the portion comprises the query.
摘要:
A unique (or nearly unique) set of search terms (called a “Search Resource Locator,” or SRL) is used to locate information on a web page. An SRL can be used like a Uniform Resource Locator (URL) as a navigational element that finds and brings up a corresponding web site. Unlike a URL, however, an SRL is not a static address for the web site, but is instead a representation of a collection of search terms that can be used to find the site or a substantially similar site. A provided tool generates SRLs for web pages.
摘要:
Misspelled words are identified in incoming email messages. The presence of misspelled words in emails is used to help determine which the emails are spam. Various statistical information concerning the number, prevalence, distribution, etc. of misspelled words in email messages is analyzed to detect spam or other forms of undesirable email, such as phishing emails. In some embodiments, the language in which an email is written is identified in order to aid in the identification of misspelled words. In some embodiments, the analysis of the misspelling information is combined with other techniques used to identify undesirable email.
摘要:
A method and apparatus for mitigating the performance impact of background or idle time processing during interactive computing sessions. One embodiment of the present invention is a method for mitigating performance impact of background or idle time processing on interactive applications comprising identifying executable and data pages in physical memory that are associated with an interactive application that is temporarily unused and preventing any of the identified executable and data pages from paging out.
摘要:
Electronic communication messages are routed according to a user's current physical location and the physical locations of communication devices. A plurality of communication devices such as telephones and computers are associated with the user. The physical locations of the plurality of communication devices are tracked. The current physical location of the user is also tracked in real-time. Incoming communication messages to the user and outgoing communication messages from the user are routed according to routing preferences based on at least the current physical location of the user and physical locations of at least one of the communication devices.
摘要:
In response to a user sending an electronic mail message to a recipient, a whitelist manager creates a temporary whitelist entry for the recipient on the user's whitelist. The temporary whitelist entry is set to expire after a set period of time. During the period of time that the temporary whitelist entry is in effect, electronic mail messages from the recipient are passed to the user without being subject to security screening. The whitelist manager keeps track of email traffic between the user and the recipient during this time period. If the nature of this email traffic is sufficient to establish that the recipient is legitimate, the whitelist manager converts the temporary entry to a permanent one. Otherwise, the whitelist manager disables the temporary entry, after which email from the recipient to the user is subject to normal security processing.
摘要:
Applications are instrumented to gather usability information. The gathered usability information is analyzed. This analysis can identify, for example, unused or infrequently used features, very frequently used features or features that users have trouble utilizing. Based on the analysis, determinations are made as to modifications to make to the applications. The modifications can be executed by the same instrumentation used to gather the usability data.
摘要:
A parent defines friend rules for on-line association with their child. Upon a request of an on-line stranger to be a new friend of the child, stranger information about the on-line stranger is retrieved and compared to the friend rules to determine whether the stranger is allowed, blocked or restricted from being a friend with the child. Accordingly, the parent only has to use a minimal amount of time in establishing the friend rules to protect the parent's child from on-line strangers.