Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings
    141.
    发明申请
    Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings 有权
    基于传入社交网络过帐的动态安全问题妥协检查

    公开(公告)号:US20140006507A1

    公开(公告)日:2014-01-02

    申请号:US13741163

    申请日:2013-01-14

    CPC classification number: H04L63/083 H04L51/12 H04L51/32

    Abstract: An approach is provided to secure security questions by checking posts directed at a social network. In the approach, requested post is received from one of the social network users. The content of the requested post is compared to previously established security questions and corresponding security answers, either established by the user or by another user. The requested post is allowed when the comparison reveals that the content does not compromise one of the previously established security questions and corresponding security answers. However, the requested post is rejected if the comparison reveals that the content compromises one of the previously established security questions and corresponding security answers.

    Abstract translation: 提供一种方法来通过检查针对社交网络的帖子来确保安全问题。 在该方法中,从一个社交网络用户接收到所请求的帖子。 将请求的帖子的内容与先前建立的安全问题和相应的安全答案进行比较,由用户或其他用户建立。 当比较显示内容不会危及先前建立的安全问题之一和相应的安全答案时,允许所请求的帖子。 然而,如果比较显示内容损害了之前建立的安全问题之一和相应的安全答案,则所请求的帖子被拒绝。

    Optimizing query processing and routing in a hybrid workload optimized database system

    公开(公告)号:US11907220B2

    公开(公告)日:2024-02-20

    申请号:US17126427

    申请日:2020-12-18

    CPC classification number: G06F16/24545 G06F16/2379 G06F16/24537

    Abstract: A method, system and computer program product for processing queries in a hybrid database system. A database management system of the hybrid database system obtains an estimated execution time of a query by an online transaction processing engine. The database management system further obtains an estimated execution time of the query by a database accelerator. Furthermore, the database management system determines a wait time (which could be zero) for the database accelerator to process the query. The database management system then determines whether the online transaction processing engine or the database accelerator will process the query using the estimated execution time of the query by the online transaction processing engine, the estimated execution time of the query by the database accelerator and the wait time (which could be zero) for the database accelerator to process the query. In this manner, the processing of queries in hybrid database systems is optimized.

    Multi-factor authentication via multiple devices

    公开(公告)号:US11570169B2

    公开(公告)日:2023-01-31

    申请号:US16582233

    申请日:2019-09-25

    Abstract: Usage information of a user for a plurality of computing devices is identified. A usage pattern for each computing device of the plurality of computing devices of the user is developed based on the identified usage information of the user. An indication of the user accessing an application on a first computing device of the plurality of computing devices is received. The application requires one or more credentials for an authentication process associated with the application. A determination is made whether the user accessing the application using the first computing device is following the developed usage pattern of the user. Responsive to determining that the user accessing the application using the first computing device is not following developed usage pattern of the user, the authentication process associated with the application is interrupted.

    Validating received sensor data using computer cryptographic processing

    公开(公告)号:US11496291B2

    公开(公告)日:2022-11-08

    申请号:US16942784

    申请日:2020-07-30

    Abstract: Media capture and verification originally-captured media files, the nature of modifications made to captured media files, and the authenticity of various versions of files related to the captured media are discussed. A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the capture device output to produce a validatable master file which includes master media data from the capture device output, master metadata of said master media data, and master file blockchain data. The master file blockchain data includes a master file block history portion, a master file signature key portion, a master file change indication portion, and a master file signed data hash portion. The computer also modifies the master media data to produce reference file media data. reference files and distributable files. The computer verifies the authenticity of each of these files.

    Cognitive monitoring of data collection in real time

    公开(公告)号:US11301289B2

    公开(公告)日:2022-04-12

    申请号:US16138294

    申请日:2018-09-21

    Abstract: According to one or more embodiments of the present invention a computer-implemented method includes receiving a transaction-data for a transaction that occurs in a particular time-interval. The method further includes comparing a set of parameters from the transaction-data with a performance profile associated with the particular time-interval. The method further includes based on determining that the transaction is a deviant transaction, forwarding the transaction-data to a first data collector. The method further includes based on determining that the transaction is a conventional transaction, forwarding the transaction-data to a second data collector.

    Wireless channel and/or band arbitration

    公开(公告)号:US11228939B2

    公开(公告)日:2022-01-18

    申请号:US16675683

    申请日:2019-11-06

    Abstract: A computer implemented method for managing wireless bands and/or wireless channels comprises receiving information on connected local devices for a plurality of wireless routers, wherein the plurality of wireless routers are using a same wireless band and/or wireless channel, and wherein each connected local device for which information is received utilizes one or more of the plurality of wireless routers for a network connection. The method further comprises calculating, for each of the plurality of wireless routers, a congestion quotient from the received information on the connected local devices, wherein the congestion quotient defines a likelihood of destructive interference at each respective wireless router. The method further comprises determining changes in wireless band and/or wireless channel for one or more wireless routers of the plurality of wireless routers, wherein the changes lower the respective congestion quotients for each of the respective one or more wireless routers.

    Distinguishing web content and web content-associated data

    公开(公告)号:US11210359B2

    公开(公告)日:2021-12-28

    申请号:US16545348

    申请日:2019-08-20

    Abstract: A computer-implemented method can include obtaining content-associated data. The content-associated data can include an image that corresponds to content. The method can further include obtaining a set of descriptive terms corresponding to the image. The method can further include obtaining a set of related terms, based at least in part on the set of descriptive terms. The method can further include generating a set of user-expected terms, based at least in part on the set of related terms. The method can further include obtaining the content. The method can further include comparing the set of user-expected terms to the content. The method can further include generating a similarity value based on the comparing. The method can further include determining the similarity value does not exceed a threshold. The method can further include providing a notification in response to the determining that the similarity value does not exceed the threshold.

    Real-time feedback for online collaboration communication quality

    公开(公告)号:US11115454B2

    公开(公告)日:2021-09-07

    申请号:US16572974

    申请日:2019-09-17

    Abstract: Aspects of the invention include systems and methods for real-time feedback for online collaboration communication quality. A non-limiting example computer-implemented method includes monitoring a conference between a plurality of participants, wherein each participant accesses the conference via a respective Voice over Internet Protocol (VoIP) device. The method further includes detecting, by a processor, an indication, by a scoring system that monitors the conference, of a degradation of sound quality of at least one VoIP device being used to access the conference. The processor engages in verifying the indication of the degradation by analyzing a peer-to-peer test between the VoIP device that has an indication of a degradation of sound quality and a VoIP device that does not have an indication of a degradation of sound quality. The process engages in determining a corrective measure based on the indication of the degradation of sound quality and the peer-to-peer test

Patent Agency Ranking