Abstract:
Methods and systems for using or providing trusted DNS resolutions are provided. A method for using trustworthy DNS resolutions may include obtaining a trusted DNS resolution for a domain name within web content. The method may also include initiating a connection to a host associated with the domain name with the trusted DNS resolution. According to a further embodiment, the domain name may be resolved without requesting DNS resolution for the domain name subsequent to identifying the domain name. A system for using a trusted DNS resolution may include trustworthy resolution module and a connection module. A method for providing trustworthy DNS resolutions may include identifying a domain name to be resolved. The method may also include providing a trusted DNS resolution for the identified domain name within web content. A system for providing trustworthy DNS resolutions may include a domain identification module and a trusted resolution provision module.
Abstract:
Methods and systems for validating online certificate status are provided. A method for validating online certificate status may include storing data associated with a first certificate beyond an expiration time of a second certificate. The second certificate was used to validate the first certificate. The method may further include validating the first certificate upon a host connection request or prior to expiration of a second certificate. A system for validating online certificate status may include a certificate data acquirer and a certificate validator. Another method for validating online certificate status may include obtaining a hostname and selecting a first certificate based upon an association between the hostname and data associated with the first certificate. The method may also include providing the first certificate data for validation. A system for validating online certificate status may include a speculator. A system for providing an online certificate status may include a speculative server.
Abstract:
Methods, systems, and computer program products for cloud-based adaptive configuration and control of a network device include, detecting an access by a user through the network device to a cloud-based service; and responsive to the detected access, configuring the network device to be controlled by the user via a cloud-based configuration controller. Further implementations include, receiving a configuration request from the network device, wherein the configuration request includes access information pertaining to an access made by a user to a cloud-based service; determining a cloud-based identity of the user based upon the received access information; associating the cloud-based identity with an ownership identifier; forming one or more instructions to configure the network device with the ownership identifier as an owner of the network device; and transmitting the one or more instructions to the network device.
Abstract:
In some embodiments, techniques for electronic messaging may include receiving an email message; receiving an interaction with a user interface relating to the email message; extracting an email address associated with the email message; determining that the email address matches an entry in a whitelist; and responsive to receiving the interaction with the user interface relating to the email message and to determining that the email address matches the entry in the whitelist, removing the entry from the whitelist.
Abstract:
In some embodiments, techniques for electronic messaging may include receiving an email message; receiving an interaction with a user interface relating to the email message; extracting an email address associated with the email message; determining that the email address matches an entry in a whitelist; and responsive to receiving the interaction with the user interface relating to the email message and to determining that the email address matches the entry in the whitelist, removing the entry from the whitelist.
Abstract:
Methods, systems, and techniques for reducing web page load time are provided. An exemplary method for reducing web page load time includes detecting, in a browser, a cursor in a region of a web page. The region surrounds a selectable item associated with a URL. The exemplary method includes determining whether the cursor is present in the region for a threshold period of time. The exemplary method further includes performing a speculative action when it is determined that the cursor has been present in the region for the threshold period of time, without modifying underlying code of a web page associated with the URL.
Abstract:
Methods and systems for reducing web page load time include obtaining speculative information associated with a uniform resource locator (URL). The method and system also include determining whether to prefetch content of the URL based on the speculative information. The method and system further include providing an instruction to prefetch the URL content when a determination to prefetch results.
Abstract:
A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network.
Abstract:
A system and method is provided whereby a client device adaptively optimizes the selection of a network device from a plurality of network devices hosting information desired by the client device. Each of the network devices hosting information desired by the client device is associated with a common host name and a different IP address, and the client selects an optimal network device based on a rank assigned to the one or more network devices. A rank assigned to the optimal network device indicates the greatest desirability, from the client device's perspective, of the optimal network device relative to the other network devices. Furthermore, the ranks assigned to the one or more network devices are adaptively determined based upon a determination of an estimated latency, determined from the client device's perspective, between the client device and the one or more network devices.
Abstract:
A portable device is provided that carries account data. The account data may include a security code having a value that is time-varying. The value of the security code may be programmatically varied based on at least one of an algorithm or event. Authorization and use of the account may be sought from an authorization agent using the account data provided on the portable device.