METHODS FOR PROVIDING INTERNET SERVICES THROUGH A TOLL FREE CONNECTION TO A USER AND DEVICES THEREOF
    1.
    发明申请
    METHODS FOR PROVIDING INTERNET SERVICES THROUGH A TOLL FREE CONNECTION TO A USER AND DEVICES THEREOF 审中-公开
    通过与用户及其设备进行免费连接来提供互联网服务的方法

    公开(公告)号:US20150127546A1

    公开(公告)日:2015-05-07

    申请号:US14492166

    申请日:2014-09-22

    Abstract: Techniques for providing internet services to a user through a toll free connection are provided. The techniques include receiving, from an Internet Access Point (IAP), a request for the internet services through the toll free connection provided by a Cloud Service Provider (CSP), wherein the CSP is selected by the user from a plurality of CSPs. Access credentials are received from IAP and are forwarded to the selected CSP. A token is received from the CSP if the user is authenticated by the CSP based on the access credentials. The token is sent to the IAP wherein the token is used by the user to access the Internet services through the toll free connection.

    Abstract translation: 提供了通过免费连接向用户提供互联网服务的技术。 这些技术包括从因特网接入点(IAP)接收由云服务提供商(CSP)提供的通过免费连接的因特网服务的请求,其中CSP由用户从多个CSP中选择。 从IAP接收访问凭证,并转发到所选的CSP。 如果CSP基于访问凭证认证用户,则从CSP接收令牌。 令牌被发送到IAP,其中用户使用令牌通过免费连接来访问因特网服务。

    SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION
    3.
    发明申请
    SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION 有权
    检测在线隐私违规的系统和方法

    公开(公告)号:US20150088777A1

    公开(公告)日:2015-03-26

    申请号:US14493316

    申请日:2014-09-22

    CPC classification number: G06Q50/265 G06Q30/01

    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.

    Abstract translation: 本发明涉及一种检测在线隐私违规的方法。 该方法包括以下步骤:将跟踪器嵌入到网络浏览器中以打开至少一个数据消费者网站或至少一个第三方网站,其中用户将至少一个数据值提交到数据消费者网站中的相应数据字段中; 使用跟踪器生成一个或多个隐私简档,其中该简档帮助用户根据用户偏好来选择一个或多个数据字段; 使用跟踪器捕获用户选择的一个或多个数据字段及其相应的多个浏览历史; 将所述简档和所述多个浏览历史存储到至少一个数据库中; 触发跟踪器以检测第三方网站中的在线隐私违规,并将至少一个数据字段提交到至少一个输入字段中,以检测所提交的数据字段的在线隐私违规。

    METHODS FOR COMPUTING AN ALARM TIME AND DEVICES THEREOF
    4.
    发明申请
    METHODS FOR COMPUTING AN ALARM TIME AND DEVICES THEREOF 有权
    用于计算报警时间的方法及其装置

    公开(公告)号:US20150085626A1

    公开(公告)日:2015-03-26

    申请号:US14493800

    申请日:2014-09-23

    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.

    Abstract translation: 本发明描述了用于计算报警时间的系统,方法和计算机产品程序。 该系统包括用于产生报警的报警装置。 该系统还包括驻留在报警装置上的用于提供至少一个用户定义的报警状况的报警应用。 该系统还包括一个报警引擎,用于接收用户定义的报警条件,启动一个探测器从数据源接收数据,处理接收的报警条件和接收到的数据,以计算报警时间和下一个探测时间,重复迭代直到下一个探测时间 小于计算的报警时间。 当下一个探测时间变得大于报警时间时,系统会在计算出的报警时间内产生报警。

    System and method to detect online privacy violation

    公开(公告)号:US09934542B2

    公开(公告)日:2018-04-03

    申请号:US14493316

    申请日:2014-09-22

    CPC classification number: G06Q50/265 G06Q30/01

    Abstract: The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.

    SYSTEM AND METHOD FOR VERIFYING INTEGRITY OF CLOUD DATA USING UNCONNECTED TRUSTED DEVICE
    6.
    发明申请
    SYSTEM AND METHOD FOR VERIFYING INTEGRITY OF CLOUD DATA USING UNCONNECTED TRUSTED DEVICE 有权
    使用无连接的有害设备验证云数据的完整性的系统和方法

    公开(公告)号:US20150180835A1

    公开(公告)日:2015-06-25

    申请号:US14561992

    申请日:2014-12-05

    CPC classification number: H04L67/1097 G06F21/34 G06F21/6236 H04L63/123

    Abstract: The present invention provides a method and system for verifying integrity of cloud data using unconnected trusted device. The method involves requesting encrypted data though a terminal from a metadata offsite location on a cloud storage then entering encrypted data into an unconnected trusted device thereafter obtaining sentinel data from one or more predefined sentinel locations in encrypted data then requesting original data from the cloud storage through the terminal from the unconnected trusted device thereafter comparing sentinel data and original data for integrity and finally displaying the results.

    Abstract translation: 本发明提供一种用于使用未连接的可信设备验证云数据的完整性的方法和系统。 该方法包括通过终端从云存储上的元数据异地位置请求加密数据,然后将加密数据输入到未连接的可信设备中,此后从加密数据中的一个或多个预定义的哨点位置获取定点数据,然后从云存储请求原始数据 来自未连接的可信设备的终端此后比较哨兵数据和原始数据的完整性,并最终显示结果。

    Methods for computing an alarm time and devices thereof
    8.
    发明授权
    Methods for computing an alarm time and devices thereof 有权
    计算闹钟时间的方法及其装置

    公开(公告)号:US09563178B2

    公开(公告)日:2017-02-07

    申请号:US14493800

    申请日:2014-09-23

    Abstract: The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is greater than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.

    Abstract translation: 本发明描述了用于计算报警时间的系统,方法和计算机产品程序。 该系统包括用于产生报警的报警装置。 该系统还包括驻留在报警装置上的用于提供至少一个用户定义的报警状况的报警应用。 该系统还包括一个报警引擎,用于接收用户定义的报警条件,启动一个探测器从数据源接收数据,处理接收到的报警条件和接收到的数据,以计算报警时间和下一个探测时间,重复迭代直到下一个探测时间 大于计算出的报警时间。 当下一个探测时间变得大于报警时间时,系统会在计算出的报警时间内产生报警。

    Systems, methods and computer readable media for calculating a security index of an application hosted in a cloud environment
    9.
    发明授权
    Systems, methods and computer readable media for calculating a security index of an application hosted in a cloud environment 有权
    用于计算云环境中托管的应用程序的安全索引的系统,方法和计算机可读介质

    公开(公告)号:US09280669B2

    公开(公告)日:2016-03-08

    申请号:US13891222

    申请日:2013-05-10

    CPC classification number: G06F21/577

    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.

    Abstract translation: 本发明提供了一种用于计算云环境中托管的应用的安全索引的方法和系统。 该应用程序被映射到云环境的云服务提供商,并且识别适用于该应用的一组安全控制和一组安全度量。 一组安全控制和一组安全性度量由安全控制模块封装到安全配置文件对象中。 通过云探测模块从云服务提供商检索一组安全度量值,并计算应用程序的安全索引。

    SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR CALCULATING A SECURITY INDEX OF AN APPLICATION HOSTED IN A CLOUD ENVIRONMENT
    10.
    发明申请
    SYSTEMS, METHODS AND COMPUTER READABLE MEDIA FOR CALCULATING A SECURITY INDEX OF AN APPLICATION HOSTED IN A CLOUD ENVIRONMENT 有权
    用于计算云环境中应用安全指标的系统,方法和计算机可读介质

    公开(公告)号:US20130305376A1

    公开(公告)日:2013-11-14

    申请号:US13891222

    申请日:2013-05-10

    CPC classification number: G06F21/577

    Abstract: The present invention provides a method and system for calculating a security index of an application hosted in a cloud environment. The application is mapped to a cloud service provider of the cloud environment, and a set of security controls and a set of security metrics applicable for the application are identified. The set of security controls and the set of security metrics are encapsulated into a security profile object by a security control module. A set of values of the set of security metrics are retrieved from the cloud service provider, by a cloud probe module, and the security index of the application is calculated.

    Abstract translation: 本发明提供了一种用于计算云环境中托管的应用的安全索引的方法和系统。 该应用程序被映射到云环境的云服务提供商,并且识别适用于该应用的一组安全控制和一组安全度量。 一组安全控制和一组安全性度量由安全控制模块封装到安全配置文件对象中。 通过云探测模块从云服务提供商检索一组安全度量值,并计算应用程序的安全索引。

Patent Agency Ranking