Patents Issued in March 11, 2014
  • Patent number: 8671453
    Abstract: A social networking system obtains parental authorization from a parent for a child to access a computing resource, where the parent and the child are users of the social networking system. The child user may request the authorization by identifying a purported parent user. The social networking system attempts to verify the validity of the purported parent user's account, the age of the user associated with the purported parent's account, and/or the existence of a parent-child relationship between users of the accounts associated with the purported parent and the child. The social networking system makes these determinations, at least in part, using social and transactional information associated with the purported parent user's account and the child user's account in the social networking system. Upon verification of these items, the social networking system may allow the purported parent to provide authorization responsive to the child's request to access the computing resource.
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: March 11, 2014
    Assignee: Facebook, Inc.
    Inventors: Edward Moore Underwood, Joseph E. Sullivan, Ryan McGeehan
  • Patent number: 8671454
    Abstract: A point of sale system including at least one proxy server having an internet connection, a web browser operative to download web pages from the internet via the proxy server, and a real time user input limiting trusted computing base module communicating with the web browser and being operative to limit user input to the web pages in real time.
    Type: Grant
    Filed: November 4, 2010
    Date of Patent: March 11, 2014
    Assignee: Verifone, Inc.
    Inventors: David Bruce Ezell, Chris Anthony Madden, Aidan Totterdell
  • Patent number: 8671455
    Abstract: A method for detecting unintentional information disclosure. The method may include: 1) identifying at least one data access Application Programming Interface (API) programmed to provide access to sensitive information located on a computing device, 2) monitoring attempts to use the data access API, 3) while monitoring attempts to use the data access API, detecting an attempt by an application to access the sensitive information through the data access API, 4) in response to detecting the attempt to access the sensitive information, tracking the sensitive information accessed by the application, 5) detecting an attempt to leak the sensitive information outside of the computing device, and 6) in response to detecting the attempt to leak the sensitive information outside of the computing device, performing a security action.
    Type: Grant
    Filed: September 22, 2011
    Date of Patent: March 11, 2014
    Assignee: Symantec Corporation
    Inventors: Xiaole Zhu, Jokul Tian
  • Patent number: 8671456
    Abstract: A computerized method for providing a computer code an access to a restricted resource of a computer program, comprising modifying an at least one duplicate of an at least one declaration file of the computer program by removing a restriction definition of an at least one resource of the computer program that is referred to by the computer code, thereby generating an at least one modified declaration file, and building a computer application comprising the computer code and also the computer program as being dependent on the at least one modified declaration file, thereby providing access to the at least one resource originally defined as restricted, and an apparatus for performing the same.
    Type: Grant
    Filed: June 26, 2012
    Date of Patent: March 11, 2014
    Assignee: SAP Portals Israel Ltd.
    Inventors: Or Or Igelka, Eyal Sinai
  • Patent number: 8671457
    Abstract: A method and system is provided to analyse receiver indicia of location for a set of at least one receivers to determine whether a receiver has an erroneous indicator of location. The embodiment may take further steps to confirm whether or not inappropriate usage has occurred. The method and system includes identifying a first indicia of location for a set of one or more receivers, identifying a second indicia of location for one or more receivers from the set, and determining if the first and second indicia of location are mutually inconsistent. Indicia of location include indicators of receiver location, inventory state, communication path and definition on systems. The method and system may optionally include action to report or correct the location error.
    Type: Grant
    Filed: June 5, 2006
    Date of Patent: March 11, 2014
    Assignee: Maxxian Technology Inc.
    Inventor: J. Rene Juneau
  • Patent number: 8671458
    Abstract: A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device.
    Type: Grant
    Filed: April 20, 2012
    Date of Patent: March 11, 2014
    Assignee: Google Inc.
    Inventor: Gabriel A. Cohen
  • Patent number: 8671459
    Abstract: A piece of software code, as well as a series of semi-random character strings are embedded into a copy of a software application. The application executes the embedded code on activation and may also invoke the embedded code periodically thereafter. The embedded code generates a knowledge string from a seed string and then generates an activation code from the seed string and the knowledge string. The activation code is checked against an externally-supplied code to ensure that the codes match, indicating a non-pirated copy of the software application.
    Type: Grant
    Filed: February 23, 2007
    Date of Patent: March 11, 2014
    Inventor: Malcolm Henry Nooning, III
  • Patent number: 8671460
    Abstract: A process control system includes module-level attributes that may be used to control access for writing information to unit module objects and module objects. A security check process examines the module-level attributes, which may include OPERMODE and OPERLOCK attributes, the values of which determine whether information may be written to unit module objects or module objects. The values of the module-level attributes may be controlled based on whether a particular module object is being used by the process control system.
    Type: Grant
    Filed: September 25, 2000
    Date of Patent: March 11, 2014
    Assignee: Fisher-Rosemount Systems, Inc.
    Inventors: Robert B. Havekost, David L. Deitz, Dennis L. Stevenson, William G. Irwin, Michael G. Ott
  • Patent number: 8671461
    Abstract: Apparatus, system, and media for utilizing content. An exemplary system comprises a first computing device and a second computing device, wherein the first computing device transmits a request for access to content to the second computing device, receives the content from the second computing device, and grants at least one permitted utilization of the content, and wherein the second computing device receives the request for access to content from the first computing device, determines whether the first second computing device is permitted to receive the content, grants access to the content based at least in part on the first computing device being permitted to receive the content, and transmits the content to the first computing device based at least in part on the first computing device being permitted to receive the content.
    Type: Grant
    Filed: August 20, 2012
    Date of Patent: March 11, 2014
    Assignee: ContentGuard Holdings, Inc.
    Inventors: Mark J. Stefik, Peter L. T. Pirolli