Patent application number | Description | Published |
20090006849 | PEER-TO-PEER NAME RESOLUTION PROTOCOL (PNRP) SECURITY INFRASTRUCTURE AND METHOD - A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed. | 01-01-2009 |
20090326810 | CACHING NAVIGATION CONTENT FOR INTERMITTENTLY CONNECTED DEVICES - Selectively caching content related to routing data in a computing device. Prior to traversing a route, one or more access points to a network are identified. An expected level of access to a network (e.g., signal strength) along the route is determined. Portions of the route are selected based on the expected level of access. Content corresponding to at least one of the selected portions is received and stored for access during traversal of the route. For example, map images for areas expected to have poor network connectivity are cached prior to traversing the route to ensure that routing data is displayed to a user when in those areas. During transversal of the route, content is obtained and cached if a current level of access is less than a defined threshold. | 12-31-2009 |
20100318683 | EFFICIENT TRANSFORM FROM XML TO JAVASCRIPT OBJECTS - This disclosure describes data conversion and techniques for sending and receiving data at a mobile device. In one implementation, a proxy server may receive data from a mobile device. The proxy server may convert the data and send the converted data to a network service. In another implementation, a mobile device may convert data and send that data to a network service. The network service may generate data in response and send that data to the mobile device directly | 12-16-2010 |
20100318745 | Dynamic Content Caching and Retrieval - This disclosure provides techniques for dynamic content caching and retrieval. For example, a computing device includes cache memory dedicated to temporarily caching data of one or more applications of the computing device. The computing device also includes storage memory to store data in response to requests by the applications. The storage memory may also temporarily cache data. Further, the computing device includes system software to represent to the applications of the computing device that the portions of the storage memory utilized to cache content are available to store data of the applications. In addition, the computing device includes application programming interfaces to provide content to a requesting application from a cache of the computing device and/or from a remote content source. | 12-16-2010 |
20110307522 | Light Weight Transformation - A transformation engine and transformation processes may reduce computational resources used by a client or a server, such as during the consumption of a document. According to some implementations, a data stream is received in a first format over a network. A mapping template may be associated with the data stream. A forward-traversal of the mapping template may be performed without the accumulation of an intermediate state. Following the traversal of the mapping template, an output stream is emitted in a second format. | 12-15-2011 |
20110307630 | EFFICIENT TRANSFORM FROM XML TO JAVASCRIPT OBJECTS - This disclosure describes data conversion and techniques for sending and receiving data at a mobile device. In one implementation, a proxy server may receive data from a mobile device. The proxy server may convert the data and send the converted data to a network service. In another implementation, a mobile device may convert data and send that data to a network service. The network service may generate data in response and send that data to the mobile device directly | 12-15-2011 |
20120143978 | ENABLING PLURAL COMPUTING DEVICES TO COMMUNICATE USING A MASTER ACCOUNT - Functionality is described that allows plural computing devices to share a master account. In one implementation, the functionality allows any candidate device to directly communicate with a communication system using the master account, providing that the candidate device satisfies a prescribed condition with respect to a master device. For example, the functionality can allow the candidate device to communicate with the communication system if it is within a threshold distance of the master device. In another implementation, the functionality instructs the master device and the candidate device to set up a tethering relationship. The functionality can then allow the candidate device to communicate with the communication system, via the master device, using the master account. In one implementation, the functionality can set up the tethering relationship without substantial (or any) involvement of the user (or users) who operate the master device and candidate device. | 06-07-2012 |
20140189000 | SOCIAL MEDIA IMPACT ASSESSMENT - A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions. | 07-03-2014 |
20140189536 | SOCIAL MEDIA IMPACT ASSESSMENT - A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be topic-based, leading to a more accurate identification of influential users. Such a topic-based score may indicate authority and/or impact of a user with respect to a topic. The impact may be computed based on authority combined with other factors, such as power of the user. The authority score may be simply computed, in whole or in part, directly from a tweet log without, for example creating a retweet graph. As a result, the scores may be computed, using MapReduce primitives or other constructs that allow the computations to be distributed across multiple parallel processors. Such scores may be used to select users based on impact as part of social trend analysis, marketing or other functions. | 07-03-2014 |