-
公开(公告)号:US09811037B2
公开(公告)日:2017-11-07
申请号:US15409063
申请日:2017-01-18
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Paul L. Jeran , Shell S. Simpson , Stephen D. Panshin , Jefferson P. Ward
CPC classification number: G03G15/5091 , B41J2/17543 , B41J2/17546 , G06F21/44 , G06F21/608 , G06F21/73 , G06F2221/2111 , G06F2221/2129 , G06F2221/2135 , G06F2221/2149 , H04L9/14 , H04L9/30 , H04L9/3247 , H04L63/0435
Abstract: In some examples, a device authenticates a first consumable product installed in the device, sends a first identifier of the authenticated first consumable product over a network to an engine, receives, over the network from the engine, a list of identifiers for consumable products classified as non-authentic, and in response to installation of a second consumable product in the device that stores an identifier in memory, determines whether the identifier of the second consumable product matches one of the identifiers in the received list of identifiers.
-
公开(公告)号:US20170318058A1
公开(公告)日:2017-11-02
申请号:US15649692
申请日:2017-07-14
Applicant: AT&T Intellectual Property I, L.P.
Inventor: Evgene Vahlis , Paul Giura
CPC classification number: H04L63/20 , G06F16/122 , G06F16/245 , G06F21/602 , G06F21/6227 , G06F2221/2149 , H04L9/3226 , H04L63/0428 , H04L63/105
Abstract: To verify compliance with a data access policy, a query result including data specified by a requesting entity and a representation of a data access policy is received from a database. Based on the representation of the data access policy included in the query result, it is verified whether the requesting entity is permitted to access the data included in the query result. Transmission of the data included in the query result to the requesting entity is controlled responsive to the verification. Related methods, systems, and computer program products are also discussed.
-
公开(公告)号:US09805196B2
公开(公告)日:2017-10-31
申请号:US12394430
申请日:2009-02-27
Applicant: Kenneth D. Ray , James M. Alkove , Lonny Dean McMichael , Nathan T. Lewis , Patrik Schnell
Inventor: Kenneth D. Ray , James M. Alkove , Lonny Dean McMichael , Nathan T. Lewis , Patrik Schnell
CPC classification number: G06F21/57 , A63F13/73 , A63F13/75 , G06F21/51 , G06F21/575 , G06F2221/2149 , G09C1/00 , H04L9/3234 , H04L9/3239 , H04L9/3271
Abstract: An anti-cheating system may comprise a combination of a modified environment, such as a modified operating system, in conjunction with a trusted external entity to verify that the modified environment is running on a particular device. The modified environment may be may be modified in a particular manner to create a restricted environment as compared with an original environment which is replaced by the modified environment. The modifications to the modified environment may comprise alternations to the original environment to, for example, detect and/or prevent changes to the hardware and/or software intended to allow cheating or undesirable user behavior.
-
公开(公告)号:US20170293763A1
公开(公告)日:2017-10-12
申请号:US15628228
申请日:2017-06-20
Applicant: Advanced Elemental Technologies, Inc.
Inventor: Victor Henry SHEAR , Peter Robert WILLIAMS , Jaisook RHO , Timothy St. John REDMOND
CPC classification number: G06F21/57 , G06F21/31 , G06F21/316 , G06F21/32 , G06F21/445 , G06F21/45 , G06F21/53 , G06F21/575 , G06F21/6218 , G06F21/6245 , G06F21/64 , G06F2221/2129 , G06F2221/2149 , H04L63/0861 , H04L63/20
Abstract: The embodiments herein provide a secure computing resource set identification, evaluation, and management arrangement, employing in various embodiments some or all of the following highly reliable identity related means to establish, register, publish and securely employ user computing arrangement resources in satisfaction of user set target contextual purposes. Systems and methods may include, as applicable, software and hardware implementations for Identity Firewalls; Awareness Managers; Contextual Purpose Firewall Frameworks for situationally germane resource usage related security, provisioning, isolation, constraining, and operational management; liveness biometric, and assiduous environmental, evaluation and authentication techniques; Repute systems and methods assertion and fact ecosphere; standardized and interoperable contextual purpose related expression systems and methods; purpose related computing arrangement resource and related information management systems and methods, including situational contextual identity management systems and methods; and/or the like.
-
公开(公告)号:US09787659B2
公开(公告)日:2017-10-10
申请号:US14658349
申请日:2015-03-16
Applicant: Micro Focus Software Inc.
Inventor: Lloyd Leon Burch , Prakash Umasankar Mukkara , Douglas Garry Earl
CPC classification number: H04L63/08 , G06F9/455 , G06F9/45533 , G06F21/33 , G06F21/53 , G06F2221/2149 , H04L63/0272 , H04L63/10 , H04L67/10
Abstract: Techniques for secure access management to virtual environments are provided. A user authenticates to a portal for purposes of establishing a virtual machine (VM). The portal interacts with a cloud server and an identity server to authenticate the user, to acquire an Internet Protocol (IP) address and port number for the VM, and to obtain a secure token. The user then interacts with a secure socket layer virtual private network (SSL VPN) server to establish a SSL VPN session with the VM. The SSL VPN server also authenticates the token through the identity server and acquires dynamic policies to enforce during the SSL VPN session between the user and the VM (the VM managed by the cloud server).
-
公开(公告)号:US09779070B2
公开(公告)日:2017-10-03
申请号:US14479786
申请日:2014-09-08
Applicant: Amazon Technologies, Inc.
Inventor: Prashant J. Thakare , Andrew S. Huntwork , Jeremy Boynes , Shashank Shekhar , Pravi Garg
CPC classification number: G06F17/2252 , G06F17/3089 , G06F21/53 , G06F2221/2149 , H04L63/10 , H04L63/105
Abstract: Disclosed are various embodiments relating to generating portions of network pages associated with a network site, where the portions of the network pages are generated by page generation code that uses a subset of aggregated data provided to it. A request for a network page is received from a first party. Data is aggregated from one or more data sources in response to the request. Each data source provides multiple data items using a multipart encoding. Page generation code supplied by the first party is executed to generate at least a portion of the network page in response to receiving a subset of the data which is used by the page generation code. The page generation code is able to access the subset of the data as predefined variables.
-
77.
公开(公告)号:US20170277899A1
公开(公告)日:2017-09-28
申请号:US15081412
申请日:2016-03-25
Applicant: GETAC TECHNOLOGY CORPORATION
Inventor: Chih-Yu Yang
CPC classification number: G06F21/604 , G06F21/6218 , G06F21/629 , G06F2221/2111 , G06F2221/2141 , G06F2221/2149
Abstract: A method for executing access control over an electronic device includes: detecting a position information of the electronic device with a positioning module; determining whether the electronic device has moved outside an authorized region according to the position information; and disabling a plurality of accessible functions of the electronic device according to a user information when the electronic device has moved outside the authorized region.
-
公开(公告)号:US20170272816A1
公开(公告)日:2017-09-21
申请号:US15075895
申请日:2016-03-21
Applicant: Google Inc.
Inventor: Timothy Olds
IPC: H04N21/458 , H04N21/45 , H04N21/258
CPC classification number: H04N21/458 , G06F17/30867 , G06F21/00 , G06F21/6218 , G06F2221/2149 , H04L63/08 , H04L67/02 , H04L67/143 , H04L67/306 , H04N21/25883 , H04N21/4532
Abstract: Systems and methods for automatically identifying non-canonical user sessions utilize demographics associated with a device identifier in comparison to demographics associated with requested content (e.g. video, website, etc.). If the demographics match above a threshold, then the session may be assumed to be canonical or associated with the original user. If the demographics of the content do not match the demographics of the user, then the session may be considered non-canonical. Upon identifying a non-canonical session, content selection based on demographics may be suspended until a timer expires or the session ends.
-
公开(公告)号:US20170249463A1
公开(公告)日:2017-08-31
申请号:US15595001
申请日:2017-05-15
Applicant: TRUSTWAVE HOLDINGS, INC.
Inventor: Walter L. Marsden , David L. Green
IPC: G06F21/56
CPC classification number: G06F21/566 , G06F21/53 , G06F21/56 , G06F21/567 , G06F2221/033 , G06F2221/2149
Abstract: Virus detection by executing electronic message code in a virtual machine is disclosed. An example method includes detecting that an electronic message includes executable code, the electronic message designating a destination recipient. Two or more destination computing systems are identified for the electronic message corresponding to the destination recipient specified in the electronic message prior to delivery of the electronic message to the two or more destination computing systems, the two or more destination computing systems including a first destination computing system and a second destination computing system different from the first destination computing system. Two or more simulation environments corresponding to the two or more destination computing systems are identified. The executable code is executed in the two or more simulation environments. The two or more simulation environments are monitored for a malicious action. The electronic message is delivered to the destination recipient if the action is detected.
-
公开(公告)号:US20170243001A1
公开(公告)日:2017-08-24
申请号:US15590582
申请日:2017-05-09
Applicant: VMware, Inc.
Inventor: Manish Jawa , Haim Tebeka , Craig Newell
IPC: G06F21/53 , H04W12/02 , H04L29/06 , G06F21/31 , G06F9/445 , G06F9/54 , H04L29/08 , G06F21/54 , G06F21/60 , H04W12/00
CPC classification number: G06F8/54 , G06F8/61 , G06F9/44521 , G06F9/54 , G06F21/31 , G06F21/53 , G06F21/54 , G06F21/602 , G06F21/604 , G06F2221/2107 , G06F2221/2143 , G06F2221/2149 , H04L63/0272 , H04L63/10 , H04L63/20 , H04L67/146 , H04W12/00 , H04W12/02
Abstract: One embodiment of the present invention provides system for facilitating replacement of a system function in an application with a customized function. During operation, the system shifts an existing load command in a file of an application to accommodate an additional load command. The system also adds the additional load command to the file. The additional load command identifies additional instructions that change a pointer of the application from a value that points to a system function to another value that points to a customized function.
-
-
-
-
-
-
-
-
-