摘要:
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving a plurality of advertisement messages via the communications network, each advertisement message of the plurality of advertisement messages including a set of meta-information which describes the content of an advertisement associated with the advertisement message; determining whether each advertisement message is relevant to the user by comparing the set of meta-information to a set of user preferences associated with the user, the set of user preferences stored locally on the user node; when an advertisement message is determined to not be relevant to the user, discarding the advertisement message; and when an advertisement message is determined to be relevant to the user, providing the user with access to the advertisement associated with the advertisement message.
摘要:
Various exemplary embodiments relate to a method and related network element including one or more of the following: receiving a plurality of advertisement messages via the communications network, each advertisement message of the plurality of advertisement messages including a set of meta-information which describes the content of an advertisement associated with the advertisement message; determining whether each advertisement message is relevant to the user by comparing the set of meta-information to a set of user preferences associated with the user, the set of user preferences stored locally on the user node; when an advertisement message is determined to not be relevant to the user, discarding the advertisement message; and when an advertisement message is determined to be relevant to the user, providing the user with access to the advertisement associated with the advertisement message.
摘要:
A certificate registry system is configured to issue authentication certificates issued to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates is devoid of linkage between the corresponding one of the information providers and domain name information thereof. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located.
摘要:
A method is carried out by a computer system for combating malicious keystroke-logging activities thereon. An operation is performed for generating a plurality of fake keystroke datasets that are each configured to resemble a keystroke dataset generated by keystrokes made on an input device of the computer system while entering sensitive information of a prescribed configuration. An operation is performed for receiving an instance of the sensitive information instance of the prescribed configuration concurrently with generating the fake keystroke datasets. Receiving the sensitive information instance includes a user of the computer system entering the sensitive information instance by performing keystrokes on the input device of the computer system such that a real keystroke dataset corresponding to the sensitive information instance is generated. An operation is performed for embedding the real keystroke dataset within at least a portion of the fake keystroke datasets after receiving the sensitive information instance.
摘要:
The present invention relates generally to multimedia, and more specifically, to a system and method of improved television viewing using automatic parallel recording of television channels. The invention continuously captures and records multimedia content for a set of “channels” in a central location, buffering all available channels for a number of days or weeks on a continuous basis. The buffered programming may then be streamed over a network such as the Internet on request, to the viewer's premises where it can be viewed on request via an appropriate display device such as a television equipped with an IP-enabled set top box or on a personal computer.
摘要:
Methods and systems are presented for detection of malware such as worms in which a network switch entices the malware into sending scan packets by allocating one or more ports as bait addresses, sending outgoing bait packets, and identifying compromised hosts that send unexpected incoming packets to a bait address.
摘要:
A certificate registry system is configured to issue authentication certificates to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates. Each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers. Each one of the authentication certificates includes a respective Instant Messaging (IM) screen name information of the information provider. The authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located.
摘要:
A method includes receiving an authentication certificate of a voice mail account holder and/or an authentication certificate of a caller wanting to leave a voice mail message the holders' voice mail account. A voice mail apparatus that provides voice mail service for the voice mail account holder performs such receiving. The account holder and/or the caller are authenticated after receiving the authentication certificate of the party being authenticated. Authenticating the account holder and/or the caller is performed using authentication information contained within the respective certificate. After such authentication is successfully performed, a voice mail message record can be created in the account of the account holder. Such creating includes allowing the caller to store the message in the account of the account holder in addition to associating authenticated identification information of the caller with the message and/or providing authenticated identification of the account holder to the caller.
摘要:
Malware detection systems are presented in which a list is constructed of enterprise hosts to or from which each given enterprise network host sends or receives packets within a current measurement period and statistics are accumulated based on two or more measurement period lists, with a count value being derived from the statistics to indicate the number of other hosts to or from which each monitored host sent or received packets, and one or more monitored hosts may be identified as suspected of being infected with slow and/or distributed scanning malware for which the count value exceeds a threshold value.
摘要:
A certificate registry system configured to issue authentication certificates to each one of a plurality of information providers and to maintain a root certificate corresponding to all of the authentication certificates, wherein each one of the authentication certificates links respective authentication information thereof to identification information of a corresponding one of the information providers, wherein each one of the authentication certificates is devoid of linkage between the corresponding one of the information providers and e-mail address information thereof, and wherein the authentication certificates of the certificate registry are associated in a manner at least partially dependent upon at least one of a particular type of information that the information providers provide, a particular organization that the information providers are associated with, a particular type profession in which the information providers are engaged and a particular geographical region in which the information providers are located.