Abstract:
Disclosed is a method for protecting a single sign on domain from credential leakage. In the method an authentication server (210) provides an authentication cookie (102) to a browser client (220). The cookie has an authentication credential for the domain and is associated with an authentication subdomain of the domain. The server (10) receives the cookie from the browser client (114). Upon authentication of the user authentication credential in the received cookie the server (210) responds to the access request by forwarding to the browser client a limited use cookie for the domain (132). The server (210) receives a request (134) from the content server (230) to validate a session identifier of the limited use cookie received from the browser client. Upon validation the server (210) provides a valid session message (182) to the content server (230) for enabling the content server to forward requested content (184) to the client.
Abstract:
Systems and methods for managing transmissions of a mobile device are described herein. An example of a mobile device described herein includes an environment monitor module configured to perform one or more observations of a local environment associated with the mobile device a connectivity tracker module communicatively coupled to the environment monitor module and configured to determine whether the one or more observations indicate wireless connectivity of the mobile device has been restored and a retransmit timeout (RTO) manager module communicatively coupled to the connectivity tracker module and configured to reset at least one RTO value of the mobile device if the wireless connectivity of the mobile device has been determined to be restored.
Abstract:
Systems and methods for protecting digital assets (40) associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets (40) associated with a device (10), computing at least one device worth value using the at least one asset worth value assigned to the digital assets (40) associated with the device (10), identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets (40) associated with the device (10) based on the comparison.
Abstract:
An apparatus, system and method for overriding battery discharge protection in a mobile communication device in the presence of an emergency communication. The method of overriding battery discharge protection in a mobile communication device comprises determining a measured battery voltage (300); determining an excess battery discharge condition (310), wherein further battery discharge will result in an impaired ability to recharge a battery; detecting an emergency communication state (320); disabling battery discharge protection in response to the emergency communication state (330); and continuing discharge of the battery (350).
Abstract:
Methods and systems for indexing patent related prior art citations are disclosed. Electronic documents can be obtained from one or more patent information systems. An OCR process can be performed on some of the electronic documents. Citations within the documents can be identified and compared to a trusted records list. The citations can be associated with one or more predetermined categories. For example, citations can be categorized into groups such as when a reference is cited (e.g., with original filing, pre and post allowance), who provided the reference (e.g., cited by the applicant, or the examiner), and how the reference is characterized (e.g., statutory basis, combination of references). The citations and corresponding categories can be output to a user or made available for subsequent processing.
Abstract:
Disclosed is an apparatus, system, and method to decrypt an encrypted account credential at a second device that is received from a first device. The second device may receive a first share of a master key and the encrypted account credential from the first device. The second device may reconstruct the master key with the first share of the master key and a second share of the master key stored at the second device. The second device may decrypt the encrypted account credential with the reconstructed master key. Based upon the decrypted account credential, the second device may be enabled to access an account based upon the decrypted account credential.