摘要:
A method, system and article of manufacture for providing a spy-resistant keyboard. The spy-resistant keyboard provides a user with additional protection against unauthorized observers while the user is interfacing with a system implementing the spy-resistant keyboard. The keyboard may include a number of tiles with a number of user-selectable characters randomly associated with each tile. A spy-resistant keyboard may also include a number of movable tiles with user-selectable characters. Before a user selects a user-selectable associated with one of the tiles, all the user-selectable characters in the tiles are at least blanked to avoid unauthorized viewing of a chosen tile.
摘要:
A method, system and article of manufacture for providing a spy-resistant keyboard. The spy-resistant keyboard provides a user with additional protection against unauthorized observers while the user is interfacing with a system implementing the spy-resistant keyboard. The keyboard may include a number of tiles with a number of user-selectable characters randomly associated with each tile. A spy-resistant keyboard may also include a number of movable tiles with user-selectable characters. Before a user selects a user-selectable associated with one of the tiles, all the user-selectable characters in the tiles are at least blanked to avoid unauthorized viewing of a chosen tile.
摘要:
Disclosed is a unique system and method that facilitate group communication using SMS text messaging and a plurality of SMS based commands. More specifically, the system and method make use of mobile communication devices such as mobile or cellular phones, smart phones, and/or PDAs which are equipped with SMS capabilities. Communication within a group of users can be accomplished in part by creating a text message and sending it to at least one communication server by way of at least one common access number. The communication server can analyze the message to determine the recipient group and broadcast the message to the members of the group in real-time or near real-time. Groups can be user-defined and managed dynamically by users using either a website interface or a mobile communication device interface at any time or anywhere. The communication server can be a suitably equipped mobile communication device or a separate server can be employed.
摘要:
In one embodiment, a method includes accessing a structured document of a network application, processing the structured document to generate a model representation of the structured document, tracking one or more interactions occurring during the processing of the structured document, the one or more interactions including one or more outgoing requests transmitted by the one or more computing systems or incoming responses received by the one or more computing systems, and generating a behavior model of the web application based on one or more of the interactions.
摘要:
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.
摘要:
User sessions are authenticated based on locations associated with a user account used for sending a request for creating a session. Examples of locations of a source of a request include a geographical location, a network address, or a machine cookie associated with a device sending the request. Locations of the request are compared with stored safe locations associated with the user account and a suspiciousness index is determined for the session. The level of authentication required for the session is determined based on the suspiciousness index. Locations are associated with a reputation based on past history of sessions originating from the locations. A location associated with a history of creating suspicious session is considered an unsafe location. Reputation of the location originating the session is used to determine the level of authentication required for the session.
摘要:
Disclosed is a unique system and method that facilitate group communication using SMS text messaging and a plurality of SMS based commands. More specifically, the system and method make use of mobile communication devices such as mobile or cellular phones, smart phones, and/or PDAs which are equipped with SMS capabilities. Communication within a group of users can be accomplished in part by creating a text message and sending it to at least one communication server by way of at least one common access number. The communication server can analyze the message to determine the recipient group and broadcast the message to the members of the group in real-time or near real-time. Groups can be user-defined and managed dynamically by users using either a website interface or a mobile communication device interface at any time or anywhere. The communication server can be a suitably equipped mobile communication device or a separate server can be employed.
摘要:
Methods, apparatuses and systems directed to federated access to social networking information of a user initiated upon activation of a physical access token. A user may initiate a workflow, by activating a physical token, that establishes a federated access session between a third-party system and a social networking system to allow the third-party system to augment the user's experience with social networking information without the user directly accessing either the third-party system or the social networking system.
摘要:
A method, system and article of manufacture for providing a spy-resistant keyboard. The spy-resistant keyboard provides a user with additional protection against unauthorized observers while the user is interfacing with a system implementing the spy-resistant keyboard. The keyboard may include a number of tiles with a number of user-selectable characters randomly associated with each tile. A spy-resistant keyboard may also include a number of movable tiles with user-selectable characters. Before a user selects a user-selectable associated with one of the tiles, all the user-selectable characters in the tiles are at least blanked to avoid unauthorized viewing of a chosen tile.
摘要:
A method, system and article of manufacture for providing a spy-resistant keyboard. The spy-resistant keyboard provides a user with additional protection against unauthorized observers while the user is interfacing with a system implementing the spy-resistant keyboard. The keyboard may include a number of tiles with a number of user-selectable characters randomly associated with each tile. A spy-resistant keyboard may also include a number of movable tiles with user-selectable characters. Before a user selects a user-selectable associated with one of the tiles, all the user-selectable characters in the tiles are at least blanked to avoid unauthorized viewing of a chosen tile.