CPC

CPC Class H04W

45 patents in CPC class H04W

45 Patents
0 Views
Updated 2/10/2026

Top Patents

The illustrative embodiments described herein provide systems and methods for notifying a user when a set of characters are identified in a media file. In one embodiment, a method includes receiving a set of characters inputted by the user of a computing device, playing the media file, transcribing the media file to form a transcription, and determining whether the transcription of the media file includes the set of characters. The method also includes initiating a notification prompt on a graphical user interface of the computing device in response to determining that the media file includes the set of characters.

A method for detecting digital content misuse can include clustering, by a digital content delivery system, a set of data points into a set of digital content usage clusters, each data point from the set of data points representing a unique user account from a set of user accounts maintained by the digital content delivery system, and each data point from the set of data points having been determined based on usage signal data describing digital content usage associated with the unique user account represented by the data point; determining, based on the set of digital content usage clusters, that a first data point from the set of data points is an outlier; and in response to determining that the first data point from the set of data points is an outlier, executing a remedial action with respect to a user account represented by the first data point.

A method and system for improving automated software execution is provided. The method includes receiving in real time from a video retrieval device, visual data associated with a user of a hardware device. The user is identified with respect to the visual data. Internal software applications and hardware structures are scanned in real time and relationships between a group of Web based software applications and a group of internal software applications and hardware structures authorized for access by the user are determined. Information associated with network and hardware device access by the user is analyzed actions for execution with respect to access to the group of Web based software applications and internal software applications and hardware structures are determined. In response, the automated actions are executed with respect to access to the group of Web based software applications and internal software applications and hardware structures.

A mobile, wireless biometric identification system includes a biometric capture device which enables a smartphone, using a commercially established wireless communication networks, to capture a digital image of a human biometric (iris, fingerprint, etc.) for transmission to a central server. The biometric capture device captures a high quality image for encoding and comparison, while the overall system leverages the existing cellular communication network. The device can be used as an interface to medical databases and devices used to diagnose and treat patients.

A method is provided for controlling access to a protected resource in a computing system, which includes storing an indication of a selection of an access image type, receiving an access request for accessing the protected resource, and determining one or more access locations of an access grid of images, the access locations (and possibly the corresponding images) changing along a sequence of access requests. The method also includes generating the access grid to include corresponding access images of the access image type for the access locations and one or more other image types different from the access image type, displaying the access grid, and controlling the access to the protected resource according to a selection of one or more selected images in the access grid.

A small piece of hardware connects to a mobile device and filters out attacks and malicious code. Using the piece of hardware, a mobile device can be protected by greater security and possibly by the same level of security offered by its associated corporation/enterprise. In one embodiment, a mobile security system includes a connection mechanism for connecting to a data port of a mobile device and for communicating with the mobile device; a network connection module for acting as a gateway to a network; a security policy for determining whether to forward content intended for the mobile device to the mobile device; and a security engine for executing the security policy.

Explore More Patents

Discover additional patents in the cpc category

Browse All Patents