INFERRING DEVICE THEFT BASED ON HISTORICAL LOCATION DATA
    44.
    发明申请
    INFERRING DEVICE THEFT BASED ON HISTORICAL LOCATION DATA 有权
    基于历史位置数据传送设备

    公开(公告)号:US20170026802A1

    公开(公告)日:2017-01-26

    申请号:US14805714

    申请日:2015-07-22

    CPC classification number: H04W4/029 H04W12/12

    Abstract: A set of mobile devices are designated as a related set of mobile devices for loss indication purposes. Machine logic rules are developed to indicate loss of a mobile device. Under these rules, a determination of probable loss (for example, theft, inadvertent leaving behind) of one of the mobile devices depends, at least in part, upon the activities and/or status of other mobile devices in the set. For example, if a first mobile device in the set is expected, under the machine logic rules, to always be near a second mobile device in the set, then a determination that the second mobile device is located far away from the first mobile device may trigger a warning, or other mitigating action, that the first mobile device has probably been lost.

    Abstract translation: 一组移动设备被指定为用于丢失指示目的的一组移动设备。 开发机器逻辑规则以指示移动设备的丢失。 根据这些规则,确定一个移动设备的可能的损失(例如,盗窃,无意的离开)取决于至少部分地取决于该组中其他移动设备的活动和/或状态。 例如,如果期望集合中的第一移动设备在机器逻辑规则下总是靠近集合中的第二移动设备,则确定第二移动设备位于远离第一移动设备的位置 触发第一个移动设备可能已经丢失的警告或其他缓解措施。

    DYNAMICALLY GENERATING SOLUTION STACKS
    45.
    发明申请
    DYNAMICALLY GENERATING SOLUTION STACKS 有权
    动态生成解决方案堆栈

    公开(公告)号:US20160380920A1

    公开(公告)日:2016-12-29

    申请号:US14748626

    申请日:2015-06-24

    CPC classification number: H04L67/16 H04L47/821 H04L67/10 H04L67/303

    Abstract: Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service.

    Abstract translation: 本公开的实施例动态地生成解决方案堆栈。 在一个实施例中,接收在云计算环境中部署服务的请求。 查询服务存储库以查看描述服务的一个或多个要求的数据。 至少部分地基于服务的要求来识别一个或多个先决条件服务。 从(i)服务的堆栈服务模型和(ii)一个或多个必备服务动态地生成解决方案堆栈模型,其中解决方案堆栈模型至少部分地基于服务的要求。

    SEARCH RESULTS BASED ON A SEARCH HISTORY
    46.
    发明申请

    公开(公告)号:US20160350379A1

    公开(公告)日:2016-12-01

    申请号:US14722209

    申请日:2015-05-27

    CPC classification number: G06F17/30477 G06F17/30598 G06F17/30867

    Abstract: Aspects relate to improving search results based on a search history. Searches performed by a user are monitored to collect search data. The search data is categorized according to search terms, search sites, and result satisfactions to form the search history. A search request that includes one or more search terms related to at least one of the search terms in the search history is received. A predicted satisfaction level of the user with results of the received search request is estimated based on contents of the received search request and the search history. The search request is modified to increase the predicted satisfaction level of the user with results of the received search request. The modifying is based on contents of the received search request and the search history. A search is performed based on the modified search request.

    System for Security Conscious Energy Drain
    48.
    发明申请
    System for Security Conscious Energy Drain 有权
    安全意识能源排放系统

    公开(公告)号:US20160179649A1

    公开(公告)日:2016-06-23

    申请号:US14813892

    申请日:2015-07-30

    Abstract: A method, system and computer-usable medium are disclosed for detecting unanticipated consumption of power by a device. A first set of power consumption data is selected, followed by the collection of a second set of power consumption data, which respectively correspond to the consumption of a first and second amount of power by a device when it performs an authorized operation. The first and second sets of power consumption data are then compared to detect whether the second amount of power consumed is greater than the first amount of power consumed. If so, then a notification is generated, stating that the device has consumed an unanticipated greater amount of power as a result of performing the authorized operation.

    Abstract translation: 公开了一种方法,系统和计算机可用介质,用于检测设备的意外消耗功率。 选择第一组功耗数据,随后收集第二组功耗数据组,其分别对应于当设备执行授权操作时第一和第二功率量的消耗。 然后比较第一组和第二组功耗数据组,以检测第二消耗功率是否大于第一消耗功率。 如果是这样,则产生通知,指示由于执行授权操作,设备已经消耗了意料之外的更大的功率。

    PROTECTING MOBILE DEVICES FROM MALWARE
    50.
    发明申请
    PROTECTING MOBILE DEVICES FROM MALWARE 有权
    从恶意软件保护移动设备

    公开(公告)号:US20160171215A1

    公开(公告)日:2016-06-16

    申请号:US14568160

    申请日:2014-12-12

    CPC classification number: H04W12/12 G06F21/567 G06F21/568 H04L63/14

    Abstract: Using a system distinct from a mobile device, the mobile device is switched from a first mode to a second mode to access a set of data storage locations in the mobile device. All malware-susceptible data stored in the set of data storage locations is received at the system from the mobile device to form received data, which is analyzed at the system to detect a malware from a set of malware in a first portion of the received data. Responsive to the analyzing, the first portion of the received data is modified at the system to form a modified first portion, wherein the modifying removes the malware from the first portion. The system stores the modified first portion in a first data storage location in the mobile device and a second portion of the received data in a second data storage location in the mobile device.

    Abstract translation: 使用与移动设备不同的系统,移动设备从第一模式切换到第二模式,以访问移动设备中的一组数据存储位置。 在系统中从移动设备接收存储在数据存储单元组中的所有恶意软件敏感数据,以形成接收到的数据,该数据在系统中被分析以在接收到的数据的第一部分中从一组恶意软件中检测恶意软件 。 响应于分析,接收的数据的第一部分在系统处被修改以形成修改的第一部分,其中修改从第一部分去除恶意软件。 系统将经修改的第一部分存储在移动设备中的第一数据存储位置中,并将接收到的数据的第二部分存储在移动设备中的第二数据存储位置中。

Patent Agency Ranking