MOBILE SURVEILLANCE
    31.
    发明申请
    MOBILE SURVEILLANCE 有权
    手机监控

    公开(公告)号:US20100176949A1

    公开(公告)日:2010-07-15

    申请号:US12731548

    申请日:2010-03-25

    Abstract: In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.

    Abstract translation: 在一些实施例中,用于记录由移动设备遇到的项目的技术包括自动检测未受控环境中的项目,提取与所述项目相关联的身份,记录遭遇,其中所述遭遇包括身份,以及在 经过了预定的时间段,其中遇到没有标记为相关。

    Efficient data sharing
    32.
    发明授权
    Efficient data sharing 有权
    有效的数据共享

    公开(公告)号:US09201941B1

    公开(公告)日:2015-12-01

    申请号:US12488605

    申请日:2009-06-22

    Abstract: In some embodiments, a method for detecting a shared data element comprises providing a first feature of a first data element associated with a first storage device, detecting a second feature of a second data element associated with a second storage device, wherein the second feature is the same as the first feature, providing a challenge to a remote device associated with the second storage device, receiving a response to the challenge, providing the challenge to a second remote device via a digital network, receiving a correct response via the digital network, wherein the correct response includes a hash that has been calculated, determining whether the response is acceptable, wherein determining whether the response is acceptable includes determining whether the response is compatible with the correct response, and generating a reference to the first data element, if it is determined that the response is acceptable.

    Abstract translation: 在一些实施例中,用于检测共享数据元素的方法包括提供与第一存储设备相关联的第一数据元素的第一特征,检测与第二存储设备相关联的第二数据元素的第二特征,其中第二特征是 与第一特征相同,向与第二存储设备相关联的远程设备提出挑战,接收对挑战的响应,经由数字网络向第二远程设备提供挑战,经由数字网络接收正确的响应, 其中所述正确的响应包括已经计算的散列,确定所述响应是否可接受,其中确定所述响应是否可接受包括确定所述响应是否与所述正确响应兼容,并且生成对所述第一数据元素的引用,如果 确定响应是可接受的。

    Fraud Prevention Via Distinctive URL Display
    33.
    发明申请
    Fraud Prevention Via Distinctive URL Display 审中-公开
    通过独特的URL显示来防范欺诈

    公开(公告)号:US20150288716A1

    公开(公告)日:2015-10-08

    申请号:US14666258

    申请日:2015-03-23

    Abstract: In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.

    Abstract translation: 在一些实施例中,用于显示URL的技术包括接收URL; 规范化URL,其中规范化URL包括标准化包含在URL中的字符的编码; 确定所述URL的第一元素,其中所述URL的所述第一元素包括域; 确定URL的第二个元素; 显示URL,其中显示URL包括强调URL的第一元素,并且其中强调URL的第一元素包括使用第一字体属性显示URL的第一元素; 并且其中显示所述URL包括使用第二字体属性来显示所述URL的第二元素的第一部分并且查看所述URL的第二元素的第二部分; 并且响应于与用户界面元素的交互,提供整个URL的视图。

    Anti-phishing
    35.
    发明授权
    Anti-phishing 有权
    反网络钓鱼

    公开(公告)号:US08984640B1

    公开(公告)日:2015-03-17

    申请号:US11011870

    申请日:2004-12-13

    Abstract: In some embodiments, techniques for computer security comprise receiving a message, receiving a user-originated request for an action, wherein the action is associated with the message, determining whether the message is trustworthy, and impairing performance of the action, if it is determined that the message is not trustworthy. In some embodiments, techniques for computer security comprise receiving a message, determining whether the message is trustworthy, rendering the message, if it is determined that the message is trustworthy, and rendering a restricted version of the message, if it is determined that the message is not trustworthy.

    Abstract translation: 在一些实施例中,用于计算机安全性的技术包括接收消息,接收用于动作的用户发起的请求,其中所述动作与所述消息相关联,确定所述消息是否可信任,以及如果确定 该消息不可信。 在一些实施例中,用于计算机安全的技术包括接收消息,确定消息是否可信赖,如果确定消息是可信赖的,则呈现消息,并且如果确定消息 不守信用

    Identity-based filtering
    36.
    发明授权
    Identity-based filtering 有权
    基于身份的过滤

    公开(公告)号:US08965892B1

    公开(公告)日:2015-02-24

    申请号:US12006750

    申请日:2008-01-04

    Applicant: Aaron T. Emigh

    Inventor: Aaron T. Emigh

    CPC classification number: G06F17/30867

    Abstract: In some embodiments, techniques for determining a reputation associated with an electronic document may include determining an identity associated with the electronic document; determining an identity reputation associated with the identity, and determining a document reputation using the identity reputation.

    Abstract translation: 在一些实施例中,用于确定与电子文档相关联的信誉的技术可以包括确定与电子文档相关联的身份; 确定与身份相关联的身份信誉,以及使用身份信誉来确定文档信誉。

    Transfer-related alerting for a passenger on a public conveyance
    37.
    发明授权
    Transfer-related alerting for a passenger on a public conveyance 有权
    公共交通工具上乘客的转机警报

    公开(公告)号:US08797156B1

    公开(公告)日:2014-08-05

    申请号:US13662569

    申请日:2012-10-29

    Applicant: Aaron T. Emigh

    Inventor: Aaron T. Emigh

    Abstract: In some embodiments, techniques comprise receiving route data that includes information relating to a stop, at a portable device that is personal to a passenger on a public conveyance; determining a second destination; determining a first destination that is related to the stop, wherein the first destination is a transfer destination en route to the second destination; determining a current location of the portable device; determining, based at least in part on the current location, that the portable device has nearly reached the first destination; providing a first alert at the portable device; determining a second current location; determining that the second current location is related to the second destination; and providing a second alert.

    Abstract translation: 在一些实施例中,技术包括在公共运输工具上的乘客个人的便携式设备上接收包括与停止相关的信息的路线数据; 确定第二目的地; 确定与所述停止相关的第一目的地,其中所述第一目的地是到达所述第二目的地的路由的转移目的地; 确定便携式设备的当前位置; 至少部分地基于当前位置确定便携式设备已经接近第一目的地; 在便携式设备上提供第一警报; 确定第二当前位置; 确定所述第二当前位置与所述第二目的地相关; 并提供第二个警报。

    Protected document elements
    38.
    发明授权
    Protected document elements 有权
    受保护的文档元素

    公开(公告)号:US08423471B1

    公开(公告)日:2013-04-16

    申请号:US11016150

    申请日:2004-12-17

    Abstract: In some embodiments, techniques for computer security comprise displaying an electronic document, detecting a request to traverse a link, such as a hyperlink or a form submission, wherein the link is associated with an element of the document, evaluating an attribute, wherein the attribute is associated with the element of the document, and determining whether to perform the action based on the evaluation. Applications of these techniques include mitigating the effect of an attempt to modify web pages for fraudulent purposes, such as by a “phishing” attack incorporating malicious scripting.

    Abstract translation: 在一些实施例中,用于计算机安全的技术包括显示电子文档,检测遍历诸如超链接或表单提交的链接的请求,其中链接与文档的元素相关联,评估属性,其中属性 与文档的元素相关联,并且基于评估来确定是否执行动作。 这些技术的应用包括减轻尝试以欺诈目的修改网页的效果,例如通过并入恶意脚本的网络钓鱼攻击。

    Transfer assistance for a passenger on a public conveyance
    39.
    发明授权
    Transfer assistance for a passenger on a public conveyance 有权
    在公共交通工具上为乘客转移援助

    公开(公告)号:US08299915B1

    公开(公告)日:2012-10-30

    申请号:US13469091

    申请日:2012-05-11

    Applicant: Aaron T. Emigh

    Inventor: Aaron T. Emigh

    Abstract: In some embodiments, techniques comprise receiving route data that includes information relating to a stop, at a portable device that is personal to a passenger on a public conveyance; determining a second destination; determining a first destination that is related to the stop, wherein the first destination is a transfer destination en route to the second destination; determining a current location of the portable device; displaying the current location in conjunction with a route map that includes a representation of the route data, wherein the current location is indicated on the route map; determining, based at least in part on the current location, that the portable device has nearly reached the first destination; providing a first alert at the portable device; determining a second current location; determining that the second current location is related to the second destination; and providing a second alert.

    Abstract translation: 在一些实施例中,技术包括在公共运输工具上的乘客个人的便携式设备上接收包括与停止相关的信息的路线数据; 确定第二目的地; 确定与所述停止相关的第一目的地,其中所述第一目的地是到达所述第二目的地的路由的转移目的地; 确定便携式设备的当前位置; 与包括路线数据的表示的路线图一起显示当前位置,其中在路线图上指示当前位置; 至少部分地基于当前位置确定便携式设备已经接近第一目的地; 在便携式设备上提供第一警报; 确定第二当前位置; 确定所述第二当前位置与所述第二目的地相关; 并提供第二个警报。

    MOBILE SURVEILLANCE
    40.
    发明申请
    MOBILE SURVEILLANCE 有权
    手机监控

    公开(公告)号:US20120178478A1

    公开(公告)日:2012-07-12

    申请号:US13231808

    申请日:2011-09-13

    Abstract: In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant.

    Abstract translation: 在一些实施例中,用于记录由移动设备遇到的项目的技术包括自动检测未受控环境中的项目,提取与所述项目相关联的身份,记录遭遇,其中所述遭遇包括身份,以及在 经过了预定的时间段,其中遇到没有标记为相关。

Patent Agency Ranking