Patent application number | Description | Published |
20120011241 | LICENSE AUDITING OF SOFTWARE USAGE BY ASSOCIATING SOFTWARE ACTIVATIONS WITH DEVICE IDENTIFIERS - The provided software application includes a module that determines a machine fingerprint of a client device at an appropriate time, such as during initial software load on the client. The fingerprint may comprise various machine-determinable measures of system configuration for the client. Each application copy may be associated with a serial number. A license host may collect serial number, fingerprint and/or IP address information from clients on which the application is installed. The host may generate a map of application installations, including geographic locations of installations and number of unique serial numbers per client in specified regions. | 01-12-2012 |
20120072546 | PSYCHOGRAPHIC DEVICE FINGERPRINTING - A system for generating a psychographic device fingerprint includes a server in communication with a network and memory storing a program which, when executed by the server, performs steps for (a) detecting reception at a computing device of media content delivered via the network, (b) reading device elements stored on the computing device, (c) reading a geographic indicator from the computing device, (d) reading a content indicator identifying the media content, (e) determining a timing parameter associated with reception of the content at the computing device, and (f) deriving from the device type, the geographic indicator, the content indicator, and the timing parameter, the psychographic device fingerprint as computer readable code uniquely identifying a user of the computing device. The steps may further include recording media content received by multiple computing devices, and generating a viewership report relating computing devices and psychographic device fingerprints to the media content received. | 03-22-2012 |
20120204033 | DEVICE-BOUND CERTIFICATE AUTHENTICATION - A device-bound certificate authority binds a certificate to one or more devices by including digital fingerprints of the devices in the certificate. A device only uses a device-bound certificate if the digital fingerprint of the device is included in the certificate and is verified. Thus, a certificate is only usable by one or more devices to which the certificate is explicitly bound. Such device-bound certificates can be used for various purposes served by certificates generally such as device driver authentication and authorization of access to secure content, for example. | 08-09-2012 |
20120207162 | TRACEBACK PACKET TRANSPORT PROTOCOL - Tokens identifying all of the physical routing devices, i.e., network nodes, through which a packet travels are recorded in a limited amount of space reserved in the header of the packet for such tokens. When insufficient space remains in the header of the packet for all tokens required to identify all physical routing devices through which the packet travels, sequences of multiple tokens are replaced with an abbreviation token representing the sequence. The sequence of tokens represented by an abbreviation token can also be abbreviation tokens, supporting recursive abbreviation of the token sequence in the header of the packet as needed to record the entire route of the packet through the network regardless of the limited space in the header for tracking the route of the packet. | 08-16-2012 |
20130055357 | PERSONAL CONTROL OF PERSONAL INFORMATION - A personal information server provides personal information about an individual to a third-party only when authorized by the individual through use of a previously authenticated computing device. The personal information server authenticates both the computing device used by the third-party to access the personal data and the device used by the individual to grant or deny such access using highly secure digital fingerprints of each. The individual can allow the third-party multiple instances of access to the personal information within restrictions specified by the individual. Other advantages also arise from large-scale tracking of which devices access and control personal information of many people—particularly with respect to identifying and preventing fraud and identity theft. | 02-28-2013 |
20130117390 | LOCAL AREA SOCIAL NETWORKING - A local area social networking server limits social networking activity to people likely to be in close physical proximity to one another and likely to be engaged in similar activities, even people previously unknown to each other, by only permitting social networking between computing devices that are connected to one another through a common local area network. The server identifies recipient devices for a message that (i) are coupled to the same local area network as the sending device, (ii) are associated with demographic characteristics that match those specified for the message as intended recipients, and (iii) are indicated by receptivity data to be receptive to the message and the sender. | 05-09-2013 |
20130162394 | DATA REPOSITORY AUTHENTICATION - A data repository grants data access through a computer network only to previously authorized computing devices identified by their digital fingerprint. Digital fingerprint authentication can be used with other, conventional authentication protocols for data repository access. Digital fingerprints of authorized computing devices are received by the data repository from known and trusted computing devices. | 06-27-2013 |
20130167203 | METHOD AND SYSTEM FOR AUTHORIZING REMOTE ACCESS TO CUSTOMER ACCOUNT INFORMATION - System for authorizing a request for remote access to customer account information includes a server configured to receive the request via a network from a remote computing device, a database storing the customer account information accessible by the server, and memory accessible by the server and storing a customer notification program which, when executed by the server, performs steps for (a) identifying, responsive to the server receiving the request, the remote computing device by a device fingerprint and by a requesting location, (b) determining whether the device fingerprint matches any of a number of device fingerprints authorized to access the customer account information, and (c) sending, responsive to determining a mismatch between the device fingerprint and each of the previously authorized device fingerprints, a notification of the request to a customer-specified address, the notification indicating (i) the request, (ii) identity of the remote computing device, and (iii) the requesting location. | 06-27-2013 |
20130167230 | DEVICE REPUTATION MANAGEMENT - A device reputation server recognizes malicious devices used in prior attacks and prevents further attacks by the malicious devices. Server computers require a digital fingerprint of any client devices prior to providing any service to such client devices. Logging of network activity include the digital fingerprint of the device perpetrating the attack. When an attack is detected or discovered, the attacked server reports the attack and the digital fingerprint of the perpetrating device to a device reputation server. The device reputation server uses the report to improve future assessments of the reputation of the device associated with the reported digital fingerprint. | 06-27-2013 |
20130173334 | INFERRING USER DEMOGRAPHICS THROUGH NETWORK ACTIVITY RECORDS - Personal information on a networked client computer is used by a server from which the device has requested information to infer demographic characteristics of the user of the client computer in order to add customized content to the requested information. The personal information provided to the server is gathered from the use of network browser software by the client computer and includes cookies, history and bookmarks. Inferring demographic characteristics of the user involves application of predetermined demographics inference rules stored by the server to the personal information provided by the client. | 07-04-2013 |
20130174228 | METHOD AND SYSTEM FOR IMPLEMENTING ZONE-RESTRICTED BEHAVIOR OF A COMPUTING DEVICE - A method for implementing zone-restricted behavior of a computing device includes identifying wireless access points using the computing device, determining a number of authorized wireless access points from the wireless access points identified by the computing device, determining that the computing device is located within a restricted access zone when the number of authorized wireless access points identified by the computing device exceeds a predetermined threshold of authorized wireless access points identified, and enabling a zone mode of the computing device when the computing device is determined to be located within the restricted access zone. | 07-04-2013 |
20130191316 | USING THE SOFTWARE AND HARDWARE CONFIGURATIONS OF A NETWORKED COMPUTER TO INFER THE USER'S DEMOGRAPHIC - System information relating to the hardware and software configuration of a networked client computer is used by a server from which the client computer has requested information to infer demographic characteristics of the user of the client computer. The system information provided to the server gathered from the use of network browser software by the client computer is used by the server to add customized content to the information requested by the client computer. Inferring demographic characteristics of the user involves application of predetermined demographics inference rules stored by the server to the client computer configuration information provided by the client. | 07-25-2013 |
20130203350 | NEAR FIELD AUTHENTICATION THROUGH COMMUNICATION OF ENCLOSED CONTENT SOUND WAVES - A method for near field authentication of sources using an audio transceiver computing device includes scanning a plurality of predetermined frequencies for a free frequency, selecting the free frequency from the plurality of predetermined frequencies, generating a periodic enclosed content message, generating a modulated carrier wave representing the periodic enclosed content message, and transmitting the modulated carrier wave at the free frequency. A method for near field authentication of sources using a microphone input of a receiving computing device includes scanning a plurality of predetermined frequencies to detect a signal using the microphone input, verifying, responsive to detecting the signal, that the signal includes at least one enclosed content message, and extracting a content from the enclosed content message. | 08-08-2013 |
20130211917 | LOCAL AREA ADVERTISEMENT MANAGEMENT - A local area advertising server limits distribution of advertisements to computing devices, preferably mobile computing devices, that are carried by people likely to be in close physical proximity to a store or location to which the advertisements pertain and likely to be currently engaged in activities relevant to the advertisements. Advertisements from a specific store can be delivered immediately through the Internet to people physically inside the store. Computing devices coupled to a local area network located in or near a store or other location are presumed to be physically in or very near the store or location. By associating advertisements with local area networks to which they pertain, only advertisements associated with the local area network to which the computing device is connected are sent to the computing device. | 08-15-2013 |
20130212693 | ANONYMOUS WHISTLE BLOWER SYSTEM WITH REPUTATION REPORTING OF ANONYMOUS WHISTLE BLOWER - Reputations of anonymous sources of information are managed by associating the reputations with devices from which the information is received rather than from the human individuals using those devices. The devices are recognized using a one-way identifier, such as a digital fingerprint, such that the source device cannot be used to readily identify the source device or its user(s) but all items of information received from the same source device can be readily recognized. Feedback from other devices is accumulated and used to assess trustworthiness of the source device and reputation data representing such trustworthiness is published along with the information received from the source device. | 08-15-2013 |
20130218755 | RENEWABLE RESOURCE DISTRIBUTION MANAGEMENT SYSTEM - Energy resource dispensing terminals can be added one-at-a-time to a wide area resource distribution system very easily where needed as needed. Each terminal can dispense any of a number of types of energy resources such as electricity, compressed hydrogen, compressed air, and waste vegetable oil. The energy dispensing terminal includes a terminal control computer that interacts with customer computing devices, such as personal, portable computing devices or onboard computers installed in vehicles to effect negotiation and fulfillment of energy resource purchase transactions. A resource sharing server facilitates such transactions by maintaining and verifying identities of customers and sellers along with financial account information such that a registered customer can purchase energy resources from any seller registered with the same resource sharing server. | 08-22-2013 |
20130219051 | COMPUTER-BASED COMPARISON OF HUMAN INDIVIDUALS - A test person is compared to a reference person by comparing detailed information regarding the configuration, capabilities and usage of computers—such as installed hardware devices, makes and models and firmware versions of such hardware devices, installed software, versions of installed software, and usage logs—used by the respective individuals. In effect, each person's computer is considered a proxy for the person herself, representing countless purchasing, maintenance, pastime choices in the configuration and use of a thoroughly complex personal and professional tool. | 08-22-2013 |
20130226604 | HEALTH ASSESSMENT BY REMOTE PHYSICAL EXAMINATION - A health assessment server allows people to conduct their own physical examinations using one or more medical measurement devices that are bound to one or more user devices. The user uses the medical measurement devices herself and submits the results to the health assessment server through a computer network such as the Internet, either directly from the medical measurement devices or through the user devices. The health assessment server determines an improved health state of the user at which benefits accrue to the user and periodically requests updated health attributes to measure progress toward the improved health state and projecting time until the improved health state is achieved. | 08-29-2013 |
20140123255 | SYSTEM AND METHOD FOR DEVICE AUTHENTICATION WITH BUILT-IN TOLERANCE - A system for building tolerance into authentication of a computing device includes a means for executing, from a computer-readable medium, computer-implementable steps of: (a) receiving and storing a first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint based on a first set of device components, (b) receiving a second digital fingerprint from the device at a subsequent time, (c) comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices, (d) in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components, (e) sending the request code to the remote device, (f) receiving the third digital fingerprint from the remote device in response to the request code, and (g) authenticating the device based on a comparison of the first and third digital fingerprints. | 05-01-2014 |
Patent application number | Description | Published |
20130212382 | DEVICE-BOUND CERTIFICATE AUTHENTICATION - A device-bound certificate authority binds a certificate to one or more devices by including digital fingerprints of the devices in the certificate. A device only uses a device-bound certificate if the digital fingerprint of the device is included in the certificate and is verified. Thus, a certificate is only usable by one or more devices to which the certificate is explicitly bound. Such device-bound certificates can be used for various purposes served by certificates generally such as device driver authentication and authorization of access to secure content, for example. | 08-15-2013 |
20130235873 | TRACEBACK PACKET TRANSPORT PROTOCOL - Tokens identifying all of the physical routing devices, i.e., network nodes, through which a packet travels are recorded in a limited amount of space reserved in the header of the packet for such tokens. When insufficient space remains in the header of the packet for all tokens required to identify all physical routing devices through which the packet travels, sequences of multiple tokens are replaced with an abbreviation token representing the sequence. The sequence of tokens represented by an abbreviation token can also be abbreviation tokens, supporting recursive abbreviation of the token sequence in the header of the packet as needed to record the entire route of the packet through the network regardless of the limited space in the header for tracking the route of the packet. | 09-12-2013 |
20130275442 | COMPUTER-BASED COMPARISON OF HUMAN INDIVIDUALS - A test person is compared to a reference person by comparing detailed information regarding the configuration, capabilities and usage of computers—such as installed hardware devices, makes and models and firmware versions of such hardware devices, installed software, versions of installed software, and usage logs—used by the respective individuals. In effect, each person's computer is considered a proxy for the person herself, representing countless purchasing, maintenance, pastime choices in the configuration and use of a thoroughly complex personal and professional tool. | 10-17-2013 |
20130325527 | SYSTEM AND METHOD FOR PREVENTING MULTIPLE ONLINE PURCHASES - A method for preventing redundant purchases of limited items includes steps for providing a commerce client to a user, receiving (a) financial information of the user and (b) a device identifier from a device the user is using to run the commerce client, the device identifier being based on one or more of user-configurable and non-user-configurable parameters of the user device, determining whether a previous transaction has been made with the device associated with the received device identifier, and disallowing the device from executing further transactions for a predetermined period of time. The method may be executed by an apparatus such as a computer server or stored as a series of instructions on a computer readable medium. | 12-05-2013 |
20140030687 | INCLUDING USAGE DATA TO IMPROVE COMPUTER-BASED TESTING OF APTITUDE - Administration of an aptitude test is limited to one or more explicitly authorized computers associated with the user and usage of each computer is monitored during administration of the test and evaluated to make inferences regarding the user's aptitude beyond the direct results of the test. If the computer used by an authenticated is not properly authorized for the user, much tighter authentication is required to add the computer as an authorized computer. In addition, the server determines an approximate geological location of the computer. If the computer is determined to be at a location the user is not expected to be, the server refuses to administer the test. The server receives the responsive solutions provided by the user along with usage data representing usage of the user's computer during the pendency of each challenge. In evaluating the test results, the usage data is used to make one or more inferences of the user's aptitude. | 01-30-2014 |
20140032280 | EMPLOYEE PERFORMANCE EVALUATION - Productivity of an employee is deduced from data representing the employee's usage of a computing device in carrying out tasks assigned to the employee in a number of usage sessions of computer-implemented applications invoked by the employee. Productivity can be represented as a measure of time spent by the user in one or more usage sessions of the computer-implemented applications during a given time period. Sessions can be grouped by time segments to determine the employee's productivity at various times. Sessions can also be group by categories of tasks to determine the employee's aptitude for various tasks and types of work. | 01-30-2014 |
20140164418 | UNIQUE DEVICE IDENTIFICATION AMONG LARGE POPULATIONS OF HOMOGENOUS DEVICES - A digital fingerprint identifying a device includes characteristics of a user of the device in addition to characteristics of the device itself. The personal characteristics used to form the digital fingerprint of the device are those that are likely to not change over time or to change in predictable ways. The personal characteristics are gathered from sources external to the device, such as profiles of the user stored remotely at a social networking site. Each constituent characteristic of a digital fingerprint is associated with extraction logic and comparison logic. | 06-12-2014 |
20140181317 | REMOTE RECOGNITION OF AN ASSOCIATION BETWEEN REMOTE DEVICES - A device identification server identifies a “household” to which a particular device belongs by associating the device with a LAN MAC address of the router through which the device connects to a wide area network such as the Internet because the LAN MAC address (i) is unique to the router and (ii) is not readily discoverable by interaction with the router through the wide area network, impeding spoofing by malicious entities. The device queries and receives the LAN MAC address of the router through the local area network. The device passes the LAN MAC address of the router along with its digital fingerprint to the device identification server. Devices that report the same LAN MAC address of the router through which they connect to the wide area network are determined to be from the same “household”, i.e., to be managed by one and the same entity. | 06-26-2014 |
20140187274 | PEDESTRIAN TRAFFIC MONITORING AND ANALYSIS - Numerous mobile devices report their respective locations to a server which collects the location reports to provide real-time pedestrian traffic information, e.g., as a map that shows locations of individual mobile devices. Distribution of mobile devices in a geographic area more closely represents overall population locations and densities. Each device is identified by a digital fingerprint, formed from a number of system and device configuration parameters. Each mobile device is configured to periodically report its location, e.g., at a predetermined time interval and/or whenever the mobile device determines its location for another reason. A known location of a wireless network access point to which a mobile device is connected can serve as an estimated location of the mobile device. | 07-03-2014 |
20140189055 | MIGRATION OF USAGE SESSIONS BETWEEN DEVICES - A user's session with a computing device can be migrated to any of a number of devices under the user's control. By allowing the user to migrate this session between devices in the user's device-sphere, much of the seamlessness of the user's experience in cloud computing is provided in a distributed device-sphere. The session is saved on a first device, sent to a second device, and reconstructed on the second device. A session record includes data, such as URIs, identifying the multiple open files of the session; data identifying the applications within which the files were open; and GUI positions of the windows of each of the open files. | 07-03-2014 |
20140236811 | EFFICIENT INTER-BANK FUNDS TRANSFERS - An inter-bank server maintains accounts in multiple banks and process a funds transfer from one bank to a second bank as two separate intra-bank transfers. The process is started by a bank customer initiating an intra-bank transfer within a first bank to a first inter-bank transfer account maintained by the inter-bank server in the first bank. The inter-bank server determines the amount of the transfer and parses data identifying the intended recipient from data accompanying the intra-bank transfer record. The inter-bank server initiates a transfer to the account of the intended recipient in the second bank from a second inter-bank transfer account maintained by the inter-bank server in the second bank. The amount of the transfer is the amount received in the inter-bank transfer account in the first bank. | 08-21-2014 |
20140245442 | DEVICE-SPECIFIC CONTENT DELIVERY - Devices of an individual's device-sphere recognize risky or undesirable behavior requested by devices outside of the device-sphere and allow the user to prevent the behavior. The user's decision is stored and used to protect all devices of the user's device-sphere from similar risky behavior from the outside devices. If the choice is made for all devices of the user's device-sphere, the choice is broadcast to other devices of the user's device-sphere such that other devices can benefit from the choice made by the user. | 08-28-2014 |
20140248908 | PEDESTRIAN TRAFFIC MONITORING AND ANALYSIS - Numerous mobile devices report their respective locations to a server which collects the location reports to provide real-time pedestrian traffic information, e.g., as a map that shows locations of individual mobile devices. Distribution of mobile devices in a geographic area more closely represents overall population locations and densities. Each device is identified by a digital fingerprint, formed from a number of system and device configuration parameters. Each mobile device is configured to periodically report its location, e.g., at a predetermined time interval and/or whenever the mobile device determines its location for another reason. A known location of a wireless network access point to which a mobile device is connected can serve as an estimated location of the mobile device. | 09-04-2014 |
20140258298 | PROFESSIONAL ADVICE AGGREGATION SYSTEM - A forum server distinguishes credentialed professional users from other users while maintaining the anonymity of all users. All users supply information by which they are accurately and personally identified. Personally identifying information of credentialed professionals is used to very the credential of the user through a credential authority server. In a user forum, both lay and professionally credentialed users can participate. Lay users are prevented from rating messages posted by credentialed professional users. In a professional consultation forum, only credentialed professionals are permitted to participate. Credentialed professional users are provided with a user interface by which they can rate and comment upon messages posted by other credentialed professionals. Thus, the ratings of peers are well-informed ratings. When a credentialed professional user participates in either forum, the aggregate peer rating of the user is displayed. | 09-11-2014 |
20140258471 | PREDICTIVE DELIVERY OF INFORMATION BASED ON DEVICE HISTORY - A server sends information to user devices based on not only the current location of those devices but also predicted future locations of those devices. A number of actions are associated with one or more predetermined locations, a predetermined maximum amount of time, and a predetermined minimum likelihood. When the server determines that a given user device is likely to be in one of the predetermined locations within the predetermined maximum amount of time with at least the predetermined minimum likelihood, the server performs the associated acts with respect to the user device. An example of such an action is sending a promotion or advertisement to the user device, e.g., as an SMS message. | 09-11-2014 |
20140258529 | DEVICE-SPECIFIC RESTRICTIVE CONTENT DELIVERY - A content control server implements a service similar to the National Do-Not-Call Registry for on-line content in which a user of a device can request that advertising content received from an ad server be restricted to one or more types of acceptable content. The types of content that are to be allowed and/or denied delivery to the device are associated with an identifier of the device. The identifier can be a digital fingerprint of the device. The types of content that can be controlled in the manner described herein are organized in a hierarchy. | 09-11-2014 |
20140258885 | PROFESSIONAL ADVICE AGGREGATION SYSTEM FOR ANONYMOUS USERS - A forum server distinguishes credentialed professional users from other users while maintaining the anonymity of all users. All users supply information by which they are accurately and personally identified. Personally identifying information of credentialed professionals is used to very the credential of the user through a credential authority server. In a user forum, both lay and professionally credentialed users can participate. Lay users are prevented from rating messages posted by credentialed professional users. In a professional consultation forum, only credentialed professionals are permitted to participate. Credentialed professional users are provided with a user interface by which they can rate and comment upon messages posted by other credentialed professionals. Thus, the ratings of peers are well-informed ratings. When a credentialed professional user participates in either forum, the aggregate peer rating of the user is displayed. | 09-11-2014 |
20140281561 | REGISTRATION AND AUTHENTICATION OF COMPUTING DEVICES USING A DIGITAL SKELETON KEY - A method for registering a computing device to a user account using at least one user-selected fingerprintable device externally accessible to the computing device including transmitting a registration information request to the computing device, receiving at least one device fingerprint of the at least one user-selected fingerprintable device accessible by the computing device, and primary identification data of the computing device, generating a skeleton key, recording the primary identification data, and associating the skeleton key and the primary identification data with the user account. A method for authenticating the computing device including transmitting an authentication information request to the computing device, receiving an encrypted identification data from the computing device, decrypting the encrypted identification data using a skeleton key associated with the user account, comparing the decrypted identification data with a primary identification data associated with the user account, and authenticating the computing device. | 09-18-2014 |
20140282933 | DEVICE AUTHENTICATION USING DEVICE ENVIRONMENT INFORMATION - A device authentication server authenticates a remotely located device using a detailed history of movement of the device. Such movement history is represented by data representing a history of the external state of the device within a physical environment, examples of which include accelerometer logs, orientation logs, and magnetic field logs. To authentication of the device, the device authentication server sends a device key challenge to the device. The device key challenge specifies a randomized selection of device attribute parts to be collected from the device and the manner in which the device attribute parts are to be combined to form a device key. The device key is data that identifies and authenticates the device and includes a device identifier and device environmental data for comparison to reference device environmental data. | 09-18-2014 |
20140310404 | SHARED STATE AMONG MULTIPLE DEVICES - Devices of an individual's device-sphere cooperate with a device-sphere manager to improve continuity of the user's experience using any of the devices. When a device's state changes, the device reports the change to the device-sphere manager. The device-sphere manager modifies the device image for the reporting device and informs other devices of the device-sphere that corresponding changes should be made in the other devices as well. Each device image includes application records representing applications installed in the subject device. The device image for each device also includes partition images of each of one or more partitions of persistent storage of the device. A data image for the device-sphere represents data shared among the constituent devices of the device-sphere. | 10-16-2014 |
20140310774 | DEVICE AUTHENTICATION USING INTER-PERSON MESSAGE METADATA - A device authentication server authenticates a remotely located device using unique data associated with the user of the device stored on a remotely located server that has an established relationship with the device, such as client logic installed on the device and authentication data of the user stored on the device. The unique data can be unique metadata associated with inter-person messages. Since each user receives and sends a unique collection of messages, the unique message meta-data associated with a user's account is, in aggregate, unique. | 10-16-2014 |
20140325652 | DETECTION OF DEVICE TAMPERING - A device such as a network appliance compares reference device attributes of the device obtained during manufacture to attributes of the device sampled at start-up to determine whether the device has been tampered with since manufacture. At manufacture, attributes of components of the device are measured, including attributes not normally measurable after manufacture. Upon initial power up in the field, the device measures the same attributes and compares the resulting measurements to the corresponding attribute values measured at manufacture. If any attribute has changed, the device determines that it may have been modified or tampered with and so indicates. | 10-30-2014 |
20140366103 | DEVICE AUTHENTICATION USING DISPLAY DEVICE IRREGULARITY - A device authentication server authenticates a remotely located device using data representing pixel irregularities of a display of the device. Since each display will deteriorate in a unique and randomized way, a unique mapping of pixel irregularities of a display of a device will be unique. By combining unique map of pixel irregularities of a display of the remotely located device, the device can be distinguished from similar devices when other attributes alone are insufficient to uniquely identify the device. | 12-11-2014 |
20150026805 | DEVICE REPUTATION MANAGEMENT - A device reputation server recognizes malicious devices used in prior attacks and prevents further attacks by the malicious devices. Server computers require a digital fingerprint of any client devices prior to providing any service to such client devices. Logging of network activity include the digital fingerprint of the device perpetrating the attack. When an attack is detected or discovered, the attacked server reports the attack and the digital fingerprint of the perpetrating device to a device reputation server. The device reputation server uses the report to improve future assessments of the reputation of the device associated with the reported digital fingerprint. | 01-22-2015 |
20150058990 | DEVICE-SPECIFIC CONTENT DELIVERY - Devices of an individual's device-sphere recognize risky or undesirable behavior requested by devices outside of the device-sphere and allow the user to prevent the behavior. The user's decision is stored and used to protect all devices of the user's device-sphere from similar risky behavior from the outside devices. If the choice is made for all devices of the user's device-sphere, the choice is broadcast to other devices of the user's device-sphere such that other devices can benefit from the choice made by the user. | 02-26-2015 |