Abstract:
In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.
Abstract:
In some embodiments, a method for detecting a shared data element comprises providing a first feature of a first data element associated with a first storage device, detecting a second feature of a second data element associated with a second storage device, wherein the second feature is the same as the first feature, providing a challenge to a remote device associated with the second storage device, receiving a response to the challenge, providing the challenge to a second remote device via a digital network, receiving a correct response via the digital network, wherein the correct response includes a hash that has been calculated, determining whether the response is acceptable, wherein determining whether the response is acceptable includes determining whether the response is compatible with the correct response, and generating a reference to the first data element, if it is determined that the response is acceptable.
Abstract:
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
Abstract:
In some embodiments, techniques for computer security comprise receiving a message, receiving a user-originated request for an action, wherein the action is associated with the message, determining whether the message is trustworthy, and impairing performance of the action, if it is determined that the message is not trustworthy. In some embodiments, techniques for computer security comprise receiving a message, determining whether the message is trustworthy, rendering the message, if it is determined that the message is trustworthy, and rendering a restricted version of the message, if it is determined that the message is not trustworthy.
Abstract:
In some embodiments, techniques for determining a reputation associated with an electronic document may include determining an identity associated with the electronic document; determining an identity reputation associated with the identity, and determining a document reputation using the identity reputation.
Abstract:
In some embodiments, techniques comprise receiving route data that includes information relating to a stop, at a portable device that is personal to a passenger on a public conveyance; determining a second destination; determining a first destination that is related to the stop, wherein the first destination is a transfer destination en route to the second destination; determining a current location of the portable device; determining, based at least in part on the current location, that the portable device has nearly reached the first destination; providing a first alert at the portable device; determining a second current location; determining that the second current location is related to the second destination; and providing a second alert.
Abstract:
In some embodiments, techniques for computer security comprise displaying an electronic document, detecting a request to traverse a link, such as a hyperlink or a form submission, wherein the link is associated with an element of the document, evaluating an attribute, wherein the attribute is associated with the element of the document, and determining whether to perform the action based on the evaluation. Applications of these techniques include mitigating the effect of an attempt to modify web pages for fraudulent purposes, such as by a “phishing” attack incorporating malicious scripting.
Abstract:
In some embodiments, techniques comprise receiving route data that includes information relating to a stop, at a portable device that is personal to a passenger on a public conveyance; determining a second destination; determining a first destination that is related to the stop, wherein the first destination is a transfer destination en route to the second destination; determining a current location of the portable device; displaying the current location in conjunction with a route map that includes a representation of the route data, wherein the current location is indicated on the route map; determining, based at least in part on the current location, that the portable device has nearly reached the first destination; providing a first alert at the portable device; determining a second current location; determining that the second current location is related to the second destination; and providing a second alert.
Abstract:
In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.