Abstract:
A secure distributed single-login authentication system comprises a client and a server. The client collects authentication credentials from a user and tests credentials at a variety of potential authentication servers to check where the login is valid. It combines a password with a time-varying salt and a service-specific seed in a message digesting hash, generating a first hash value. The client sends the hash value with a user name and the time-varying salt to a selected server. The server extracts the user name and looks up the user name in the server's database. If an entry is found, it retrieves the password, performing the same hash function on the combination of user name, service-specific seed, and password to generate a second hash value, comparing the values. If the values match, the user is authenticated. Thus, the system never reveals the password to authentication agents that might abuse the information.
Abstract:
Systems and techniques for transmitting electronic data by receiving, at a communications system host, electronic data transmitted from a sender and addressed to an intended recipient; authenticating the electronic data based on attributes of the electronic data and appending information to the electronic data indicating that the electronic data has been authenticated.
Abstract:
Invoking a computer implemented service includes receiving a request from a first user to access a service associated with a second user. The request is associated with a security token for the first user and an identity token for the second user. The acceptability of the security token is determined to authenticate the first user, and the acceptability of the identity token is determined to securely identify the second user. The first user is able to access the service associated with the second user conditioned on the security token being determined to be acceptable and the identity token being determined to be acceptable.
Abstract:
According to a general aspect, a method includes maintaining rating groups, each rating group providing a rating for content compiled based on information received from a user evaluating the content. The method also includes receiving, from a first user, a selection of a first rating group, from among the rating groups, to be applied to a set of users associated with the first user. The method also includes receiving, from a user, a request for a piece of content from the content. The method also includes determining that the user from which the request was received belongs to the set of users associated with the first user. The method also includes, based upon the determination that the user belonged to the set of users associated with the first user, accessing information associated with the first rating group and determining whether the first rating group includes a rating for the requested piece of content. The method also includes determining whether or not to provide information to the requesting user conditioned on the indication or absence of a rating for the requested piece of content within the first rating group.
Abstract:
Perception of multiple online personas is enabled in an instant messaging communications session. At least two identities within a communications environment to whom messages may be directed are identified. A first persona of a user is enabled to be projected to a first of the identities while a second persona of the same user is enabled to be concurrently projected to a second of the identities. The first and second personas each include an avatar capable of being animated, and the first persona and the second persona differ.
Abstract:
Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled. Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider.
Abstract:
Images may be registered using temporal (time-based) and spatial information. In a film implementation, because film is a sequence of frames, using information from neighboring frames may enable a temporally smoother visual experience. In addition, it may be beneficial to take advantage of the fact that consecutive frames are often shifted similarly during the photographic process. Distortion measures may be used that discount candidate transformations that are considered to be too far from one or more preferred transformations, such as, for example, an optimal transformation from another frame or block or a currently-optimal transformation from the same frame/block. Composite color images may be processed to provide registration of underlying components.
Abstract:
Search results may be provided to a user. A search query may be received from the user. A query feature vector may be formed for the search query. The query feature vector may be compared with news feature vectors associated with documents related to current events. An augmented query feature vector may be formed based on results of the comparison of the query feature vector with the news feature vectors. The augmented query feature vector may be compared with feature vectors related to target documents. Search results that include target documents may be identified based on results of the comparison of the augmented query feature vector with the feature vectors related to the target documents. The user may be made able to perceive at least some of the identified search results.
Abstract:
A list of “hot topics” may be provided to a user to indicate information that is currently popular. A topic may be deemed popular when a large number of search queries related to the topic are entered by users. A search system may receive and analyze an electronic source of published information to determine a reason for why a particular popular topic is popular. If content related to why a particular popular topic is popular exists in multiple electronic sources of published information, text summarization techniques may be used to determine a reason for why the popular topic is popular by from among the multiple electronic sources of published information.
Abstract:
Blotches may be identified and processed to reduce or eliminate the blotch. The blotch may be in just one of several separations and multiple separations may be used, for example, to identify the blotch. An implementation (i) compares a first component image of an image with a first component image of a reference image, (ii) compares a second component image of the image with a second component image of the reference image, and (iii) determines based on these comparisons whether the first component image of the image includes a blotch. Multiple image separations also, or alternatively, may be used, for example, to modify the blotch, as well as to evaluate whether a modification is beneficial.