Abstract:
In some embodiments, techniques for displaying a URL comprise receiving a URL; normalizing the URL, wherein normalizing the URL includes standardizing an encoding of a character contained in the URL; determining a first element of the URL, wherein the first element of the URL includes a domain; determining a second element of the URL; displaying the URL, wherein displaying the URL includes emphasizing the first element of the URL, and wherein emphasizing the first element of the URL includes displaying the first element of the URL using a first font attribute; and wherein displaying the URL includes displaying a first portion of the second element of the URL using a second font attribute and eliding a second portion of the second element of the URL; and responsive to an interaction with a user interface element, providing a view of the URL in its entirety.
Abstract:
In some embodiments, techniques for protecting a network may include detecting an insecure condition on a first host that has connected or is attempting to connect to a protected network, including contacting a trusted computing base and determining whether a response includes a valid digitally signed attestation of cleanliness (an attestation that the first host is not infested and/or that the presence of a patch or patch level of a software component on the first host); if not, quarantining the first host, including by re-routing a service request sent by the first host by responding with a redirect that causes a browser on the first host to be directed to a quarantine server configured to serve a quarantine notification page that provides remediation information; and permitting the first host to communicate with a remediation host configured to provide data usable to remedy the insecure condition.
Abstract:
This disclosure is directed to providing directional feedback to a user. For example, this disclosure describes techniques for determining at least one characteristic of a device in space. For example, a device may be configured to determine, using one or more sensors, one or more characteristics of the device in space. For example, the device may be configured to determine one or more of a direction, and/or geographical position of the device as pointed by a user in space. The device may compare one or more of the determined one or more characteristics of the device in space to a desired destination or path specified by the user, and provide the user with directional feedback if the determined one or more characteristics of the device in space are consistent with the desired destination or path.
Abstract:
Methods, systems, and apparatuses, including computer programs encoded on a computer storage medium, for optimizing search engine user input selection are disclosed. In one embodiment, the method may include receiving a partial query from a user, identifying two or more query suggestions based on the partial query, and determining a probability that each respective complete query suggestion is a query that the user intended to input. The method may also include ranking the two or more query suggestions based on the probability of each respective query suggestion, and determining that a top ranking query suggestion is associated with a probability above a threshold. The method may further include providing for display the two or more query suggestions relative to the partial query, and providing for display, an indication of the top ranking query suggestion among the two or more query suggestions.
Abstract:
A connected computer may be operated as node by inspecting communications from other nodes that pass through that node. From the communications, two or more pointers may be determined for the given node. These pointers may include a first pointer identified by a default designation that links the given node to a first node in the network, and a second pointer to another node. The second pointer may be identified by a determination that a designated criteria has been satisfied after the given node is placed on the network.
Abstract:
An automatic browser Web cache resizing system allows a browser to adjust its Web cache size to its environment automatically. When the browser starts up, the browser examines the host computer's hard drive for the amount of the available free space and allocates the maximum reasonable amount of the free space on the hard drive for the Web cache that it needs to run efficiently. During the browser's shutdown sequence, it optionally reexamines the free space on the hard drive and gives up as much of its allocated Web cache space as it can. Every time the browser writes to or reads from the Web cache, the browser checks to see if its Web cache allocation is needed for free space. If the browser sees that the amount of free space is low, it will give up some of its Web cache space that it allocated. Another preferred embodiment of the invention integrates the invention with the operating system of the host computer. The browser requests memory from the operating system. The browser can designate the allocated memory as not being critical and can be recovered by the operating system if the operating system needs part or all of the memory. The browser can optionally designate that a part of the memory allocation request is critical and the remainder is not critical.
Abstract:
An identity based service system is provided, in which an identity is created and managed for a user or principal, such that at least a portion of the identity is available to use between one or more system entities. A discovery service enables a system entity to discover a service descriptor, given a service name and a name identifier of the user, whereby system entities can find and invoke the user's other personal web services. The discovery service preferably provides a translation between a plurality of namespaces, to prevent linkable identity information over time between system entities.
Abstract:
A method and apparatus is provided for the time-based provisioning of wireless devices. A network access point monitors operation of wireless devices within a service region. When provisioning logic is activated at the network access point, the access point determines if the tracked parameter (such as power on or the onset of signal transmission) of the wireless device occurs within a designated time interval from the time of the provisioning activation. If the tracked device qualifies, the network access point proceeds with provisioning the device. In one system embodiment, the network access point tracks the power on time of wireless devices. When a wireless device to be authorized is powered on, the provisioning logic at the network access point notes the power on time. The user then activates the provisioning access at the network access point, and the network access point provisions the wireless device if it is recently powered on.
Abstract:
Systems and methods for generating a unified certificate revocation list (UCRL) are provided. A method for generating a unified certificate revocation list includes identifying revocation servers associated with public key certificates. The method also includes aggregating server information of the identified revocation servers into revocation server lists (RSLs). The method further includes combining revoked certificates of the RSLs into a unified certificate revocation list (UCRL). The method also includes compressing the UCRL into a compressed UCRL. Lossy compression may be used. Compressed UCRLs may be used to test for revocation status. A system for generating a unified certificate revocation list includes a revocation server identifier, a revocation server list generator and a UCRL filter.
Abstract:
A method of protecting connectivity in a network is provided. The method includes monitoring a client communication received from a client on the network, and determining, based on the monitoring, to buffer the client communication. Next, to avoid a flood block response from a node on the network, based on the determining the client communication is buffered, whereby the connectivity of the client is protected.