Systems and methods for sharing logs of a child's computer activities with a guardian of the child
    71.
    发明授权
    Systems and methods for sharing logs of a child's computer activities with a guardian of the child 有权
    将孩子的计算机活动的日志与儿童的监护人共享的系统和方法

    公开(公告)号:US09218495B1

    公开(公告)日:2015-12-22

    申请号:US12491374

    申请日:2009-06-25

    摘要: A computer-implemented method for sharing logs of a child's computer activities with a guardian of the child is disclosed. The method may include determining that a child may be involved in a computer activity on a computing device that is not controlled by a guardian of the child, monitoring the computer activity, creating a log of the computer activity, determining that the guardian of the child is authorized to view the log of the computer activity, and providing the log of the computer activity to the guardian of the child. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 公开了一种计算机实现的方法,用于与儿童的监护人共享儿童计算机活动的日志。 该方法可以包括确定儿童可能参与计算设备上的计算机活动,该计算机活动不是由儿童的监护人控制的,监视计算机活动,创建计算机活动的日志,确定小孩的监护人 有权查看计算机活动的日志,并将计算机活动的日志提供给小孩的监护人。 还公开了各种其它方法,系统和计算机可读介质。

    Reducing boot time by providing quantitative performance cost data within a boot management user interface
    72.
    发明授权
    Reducing boot time by providing quantitative performance cost data within a boot management user interface 有权
    通过在引导管理用户界面中提供定量性能成本数据来减少启动时间

    公开(公告)号:US08752038B1

    公开(公告)日:2014-06-10

    申请号:US12049920

    申请日:2008-03-17

    IPC分类号: G06F9/44 G06F9/00

    CPC分类号: G06F9/4401 G06F8/62

    摘要: The performance of a boot sequence is improved by presenting the user with easy to read information concerning the performance cost of each boot time application, and allowing the user to remove processes from the boot sequence or uninstall them altogether. Processes associated with the boot sequence are identified, and their corresponding performance cost is determined as percentage of the performance cost of the entire boot sequence, or according to the time they take to execute. The identified processes and their associated performance costs are presented to the user, along with a user interface component for selecting processes to remove from the boot sequence and/or uninstall. Responsive to input from the user, selected processes are removed from the boot sequence and/or uninstalled as directed.

    摘要翻译: 通过向用户呈现关于每个启动时间应用的性能成本的易读信息,并允许用户从引导顺序中删除进程或完全卸载引导顺序的性能得到改善。 识别与引导顺序相关联的进程,并将其相应的性能成本确定为整个引导序列的性能成本的百分比,或者根据执行时间来确定。 所识别的进程及其相关的性能成本被呈现给用户,以及用于选择从引导顺序和/或卸载中移除的进程的用户界面组件。 响应于来自用户的输入,所选择的进程从引导顺序中移除和/或按指示卸载。

    Techniques for providing improved perpetrator imaging
    73.
    发明授权
    Techniques for providing improved perpetrator imaging 有权
    提供改进的肇事者成像技术

    公开(公告)号:US08730334B2

    公开(公告)日:2014-05-20

    申请号:US12964972

    申请日:2010-12-10

    申请人: Shaun Cooley

    发明人: Shaun Cooley

    IPC分类号: H04N5/232 H04M1/66 G06K9/00

    摘要: Techniques for providing improved perpetrator imaging are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for providing improved perpetrator imaging comprising identifying a client device as at least one of lost and stolen, detecting, on the client device, a difference in first pixel data associated with a first frame of a visual image and second pixel data associated with a second frame of the visual image, and capturing, on the client device, a plurality of photographs in response to detecting the difference.

    摘要翻译: 公开了提供改进的犯罪者成像技术。 在一个特定的示例性实施例中,技术可以被实现为用于提供改进的犯罪者成像的方法,包括将客户端设备识别为丢失和被盗中的至少一个,在客户端设备上检测与第一 视觉图像的帧和与视觉图像的第二帧相关联的第二像素数据,以及响应于检测到差异而在客户端设备上捕获多个照片。

    SYSTEMS AND METHODS FOR PERFORMING SELECTIVE DEEP PACKET INSPECTION
    74.
    发明申请
    SYSTEMS AND METHODS FOR PERFORMING SELECTIVE DEEP PACKET INSPECTION 有权
    用于执行选择性深度分组检测的系统和方法

    公开(公告)号:US20140075554A1

    公开(公告)日:2014-03-13

    申请号:US13615444

    申请日:2012-09-13

    申请人: Shaun Cooley

    发明人: Shaun Cooley

    IPC分类号: G06F21/00

    CPC分类号: H04L63/0245 H04L63/1416

    摘要: A computer-implemented method for performing selective deep packet inspection may include 1) identify a traffic flow that includes a stream of data packets, 2) sample at least one packet from the stream of data packets, 3) analyze the sampled packet using a computing resource to determine whether the traffic flow is trustworthy, 4) determine that the traffic flow is trustworthy based on analyzing the sampled packet, and 5) divert the traffic flow to a hardware accelerator in response to determining that the traffic flow is trustworthy. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于执行选择性深度分组检测的计算机实现的方法可以包括:1)识别包括数据分组流的业务流,2)从数据分组流中采样至少一个分组,3)使用计算机 资源,以确定流量是否可信; 4)基于分析采样数据包确定流量信任度; 5)响应确定流量信任值,将业务流转移到硬件加速器。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for correlating online aliases with real-world identities
    75.
    发明授权
    Systems and methods for correlating online aliases with real-world identities 有权
    将在线别名与现实身份相关联的系统和方法

    公开(公告)号:US08578009B1

    公开(公告)日:2013-11-05

    申请号:US11960402

    申请日:2007-12-19

    IPC分类号: G06F15/16 G06F15/177

    CPC分类号: G06Q10/107 H04L61/1594

    摘要: A computer-implemented method for correlating online aliases with real-world identities may comprise accessing a first user account associated with a first online communication mechanism, obtaining contact data associated with a first online alias from the first user account, identifying contact data associated with a second online alias, identifying, by comparing the contact data associated with the first online alias with the contact data associated with the second online alias, at least one common characteristic between the first online alias and the second online alias, and associating both the first online alias and the second online alias with a common contact. A graphical user interface may display a contact's name, online aliases for by the contact, and the online communication mechanisms that may be used to communicate with the contact. The method may also facilitate communication with a contact using online communication mechanisms. Corresponding systems and computer-readable media are also disclosed.

    摘要翻译: 用于将在线别名与现实身份相关联的计算机实现的方法可以包括访问与第一在线通信机制相关联的第一用户帐户,从第一用户帐户获取与第一在线别名相关联的联系人数据,识别与 第二在线别名,通过将与第一在线别名相关联的联系人数据与与第二在线别名相关联的联系人数据进行比较,识别第一在线别名和第二在线别名之间的至少一个共同特征,并将第一在线别名 别名和第二个在线别名与常见的联系。 图形用户界面可以显示联系人的姓名,联系人的在线别名以及可能用于与联系人通信的在线通信机制。 该方法还可以促进使用在线通信机制与联系人的通信。 还公开了相应的系统和计算机可读介质。

    Systems and methods for providing security information about quick response codes
    76.
    发明授权
    Systems and methods for providing security information about quick response codes 有权
    提供有关快速响应代码的安全信息的系统和方法

    公开(公告)号:US08485428B1

    公开(公告)日:2013-07-16

    申请号:US13044855

    申请日:2011-03-10

    IPC分类号: G06F17/00 G06F21/00

    CPC分类号: G06F21/6218 H04L63/1433

    摘要: A computer-implemented method for providing security information about quick response codes may include (1) identifying an image captured by a mobile device including a matrix barcode, (2) determining that the matrix barcode includes a link to an Internet resource, (3) determining the trustworthiness of the Internet resource referenced by the matrix barcode, and then (4) augmenting the image with a visual augmentation that is based at least in part on the trustworthiness of the Internet resource. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 一种用于提供关于快速响应代码的安全信息的计算机实现方法可以包括(1)识别包括矩阵条形码的移动设备捕获的图像,(2)确定矩阵条形码包括到因特网资源的链接,(3) 确定由矩阵条形码引用的因特网资源的可信度,然后(4)至少部分地基于互联网资源的可信度的视觉增强来增强图像。 还公开了各种其它方法,系统和计算机可读介质。

    Method and apparatus for synchronizing updates of authentication credentials
    77.
    发明授权
    Method and apparatus for synchronizing updates of authentication credentials 有权
    用于同步认证证书更新的方法和装置

    公开(公告)号:US08413222B1

    公开(公告)日:2013-04-02

    申请号:US12163712

    申请日:2008-06-27

    摘要: A method and apparatus for synchronously changing authentication credentials of a plurality of domains comprising detecting an authentication credential change event for a particular domain, where the authentication credential is being changed from a first credential to a second credential, determining whether the particular domain is within a domain group, and, if the particular domain is within the domain group, changing the authentication credential of at least one other domain in the domain group from the first credential to the second credential.

    摘要翻译: 一种用于同步改变多个域的认证证书的方法和装置,包括检测特定域的认证证书改变事件,其中所述认证证书正在从第一凭证更改为第二凭证,确定所述特定域是否在 域组,并且如果特定域在域组内,则将域组中的至少一个其他域的认证凭证从第一凭证更改为第二凭证。

    Anti-phishing early warning system based on end user data submission statistics
    78.
    发明授权
    Anti-phishing early warning system based on end user data submission statistics 有权
    基于最终用户数据提交统计的反网络钓鱼预警系统

    公开(公告)号:US08321934B1

    公开(公告)日:2012-11-27

    申请号:US12115352

    申请日:2008-05-05

    IPC分类号: G06F11/00

    CPC分类号: G06F21/56

    摘要: Websites used for phishing are detected by analyzing end user confidential data submission statistics. A central process receives data indicating confidential information submitted to websites from a plurality of user computers. The received data is aggregated and analyzed, for example through statistical profiling. Through the analysis of the aggregated data, anomalous behavior concerning submission of confidential information to websites is detected, such is an unexpected, rapid increase in the amount of confidential information submitted to a given website. Responsive to detecting the anomalous behavior, further action is taken to protect users from submitting confidential information to that website. For example, an alert can be sent, a protective measure against the site can be published, the site can be added to a blacklist or a procedure to have the site shut down can be initiated.

    摘要翻译: 通过分析最终用户机密数据提交统计信息来检测用于网络钓鱼的网站。 中央处理从多个用户计算机接收指示提交给网站的机密信息的数据。 收集的数据被聚合和分析,例如通过统计分析。 通过对汇总数据的分析,检测到向网站提交机密信息的异常行为,这是提交给给定网站的机密信息量意外迅速增加。 响应检测异常行为,采取进一步行动保护用户不向机构提交机密信息。 例如,可以发送一个警报,可以发布对该站点的保护措施,该站点可以添加到黑名单或程序中以使站点关闭可以启动。

    Automatic Electronic Payments Via Mobile Communication Device With Imaging System
    79.
    发明申请
    Automatic Electronic Payments Via Mobile Communication Device With Imaging System 有权
    通过具有成像系统的移动通信设备的自动电子支付

    公开(公告)号:US20120158581A1

    公开(公告)日:2012-06-21

    申请号:US12969471

    申请日:2010-12-15

    IPC分类号: G06Q40/00

    摘要: A graphical payment identifier is used to facilitate the automatic processing of an electronic payment. A graphical identifier payment system receives a request from a payment processing entity for a onetime use graphical payment identifier. In response, a onetime use graphical payment identifier to be displayed by the payment processing entity is generated. A request for user payment information by the payment processing entity is encoded in the graphical payment identifier, which is transmitted to the payment processing entity for display. The graphical payment identifier being displayed by the payment processing entity is captured by a registered user operated computing device. In response, the requested user payment information is transmitted to the payment processing entity, such that the electronic payment is executed automatically, without the user manually entering the requested payment information or providing a credit card.

    摘要翻译: 使用图形支付标识符来促进电子支付的自动处理。 图形标识符支付系统从支付处理实体接收一次性使用图形支付标识符的请求。 作为响应,生成由支付处理实体显示的一次性使用的图形支付标识符。 支付处理实体对用户支付信息的请求被编码在图形支付标识符中,该图形支付标识符被发送到支付处理实体进行显示。 由支付处理实体显示的图形支付标识符被注册的用户操作的计算设备捕获。 作为响应,将所请求的用户支付信息发送到支付处理实体,使得电子支付被自动执行,而不需要用户手动输入所请求的支付信息或提供信用卡。

    Systems and methods for administering policies for physical locations
    80.
    发明授权
    Systems and methods for administering policies for physical locations 有权
    用于管理物理位置的策略的系统和方法

    公开(公告)号:US08112785B1

    公开(公告)日:2012-02-07

    申请号:US11967975

    申请日:2007-12-31

    IPC分类号: G06F17/00

    摘要: A method for receiving verification that a source is authorized to provide mobile-computing-device policies for a first physical location. The method may include receiving a first mobile-computing-device policy and identifying the first physical location. The method may also include associating the first mobile-computing-device policy with the first physical location and implementing, based on the verification, the first mobile-computing-device policy at the first physical location. Systems and computer-readable media for verifying that a source is authorized to provide mobile-computing-device policies for a first physical location are also disclosed.

    摘要翻译: 一种用于接收验证的方法,其中的源被授权为第一物理位置提供移动计算设备策略。 该方法可以包括接收第一移动计算设备策略并识别第一物理位置。 该方法还可以包括将第一移动计算设备策略与第一物理位置相关联,并且基于验证在第一物理位置实现第一移动计算设备策略。 还公开了用于验证源被授权为第一物理位置提供移动计算设备策略的系统和计算机可读介质。