US Pat. No. 9,946,898

SECURITY SYSTEMS AND METHODS FOR ENCODING AND DECODING DIGITAL CONTENT

ESW Holdings, Inc., Aust...

1. A method of controlling digital content on a third party webpage, the method comprising:executing instructions, stored in a non-transitory memory, by one or more processors of a computer system that cause the computer system to perform operations comprising:
using a listener, detecting when an executing browser is about to display a third party webpage by a viewing node;
in response to detecting that the third party webpage is about to be displayed, parsing the third party webpage to detect whether the third party webpage includes an encoded version of input form field content that has been inserted into the third party webpage by a client application executing on the viewing node and configured to enable a user to have control of at least portions of content published via the input form field at the third party webpage;
enabling the viewing node to have content control over at least a portion of the third party webpage by decoding the encoded version of the input form field content included in the third party webpage by:
requesting a decoding key to facilitate decoding of at least portions of the encoded version of the input form field content in the third party webpage, the decoding key request being transmitted to a policy node for processing, where the decoding key request includes session attributes about the viewing node to facilitate a determination by the policy node as to whether the viewing node is authorized to access the decoded version of the input form field content; and
receiving, from a policy node, a universal resource identifier (URI) reference to the decoding key; and
using the decoding URI reference, requesting, from the third party key node, access to the decoding key to facilitate replacement of at least portions of the encoded version of the input form field content with a decoded version of the input form field content.

US Pat. No. 10,659,439

DEVICE IDENTIFICATION SCORING

ESW Holdings, Inc., Aust...

1. A data processing system executing on at least one processor configured to facilitate identification of a first device seeking to communicate with one or more third party online service providers, the data processing system comprising:a session handler configured to communicate with the first device to determine at least one unique identifier assigned to the device, the session handler configured to request additional context verification from one or more of: the first device, an operator of the first device, or one or more other devices, wherein each unique identifier has a respective value indicative of a representative level of trust associated with that unique identifier, the respective value being configured for use as part of the trust score computation by the trust scoring engine;
a trust scoring engine, in communication with the session handler, configured to compute a trust score based on (i) the trustworthiness of the first device unique identifier, and (ii) results from the additional context verification;
a communication interface in which the third party service provider receives the first device unique identifier and the computed trust score of the first device;
wherein the trust scoring engine is further configured to:
determine which, if any, of multiple thresholds of identification risk the trust score exceeds, wherein each threshold represents a level of identification risk; and
if the trust score exceeds at least one of the thresholds of the identification risk, determine a level of access to provide the first device access to an online service of the one or more third party online service providers that corresponds to the least restrictive identification risk threshold level exceeded by the trust factor.

US Pat. No. 10,552,636

SECURITY SYSTEMS AND METHODS FOR ENCODING AND DECODING DIGITAL CONTENT

ESW Holdings, Inc., Aust...

1. A first user node to control digital content, the first user node comprising:a processor, and
a memory, coupled to the processor, storing code that is executable by the processor to cause the processor to:
receive a request to publish digital text content received at an input field in an electronic document, where the publishing request is associated with the first user node;
in response to the publishing request, determine whether to encrypt the input field text content in the electronic document;
receive instructions to replace, in the electronic document, the input field text content with an encrypted version of the input field text content based on an encryption policy defined by a controlling entity and prior to uploading the input field text content to web service, wherein the controlling entity includes a policy node that is separate from the first user node;
access the policy node;
obtain the encryption policy and an encryption key from the policy node;
encrypt the input field text content with the encryption key to generate encrypted input field text content;
tag the encrypted input field text content with a tag that includes an address of the policy node and an identifier of the encryption policy to allow the web service to extract the address of the policy node and the identifier of the encryption policy and obtain a decryption key to decrypt the encrypted input field text content; and
upload the encrypted input field text content and the tag to the web service.

US Pat. No. 10,331,908

SECURITY SYSTEMS AND METHODS FOR SOCIAL NETWORKING

ESW Holdings, Inc., Aust...

1. A method of encoding electronic data published by a user node, the method comprising:executing, by one or more processors, a program to cause the one or more processors to perform operations comprising:
detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node;
in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by:
parsing contents of the third party webpage to detect one or more form input fields;
in response to detecting input at a detected from input field in the third party webpage, assigning a policy ID associated with the detected form input field;
receiving a unique identifier assigned to the detected form input field and an encoding key for encoding the input of the detected form input field; and
in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with encoded content.

US Pat. No. 9,977,921

SECURITY SYSTEMS AND METHODS FOR ENCODING AND DECODING DIGITAL CONTENT

ESW Holdings, Inc., Aust...

1. A method of controlling digital content, the method comprising:executing code by a first user node executing code stored in a non-transitory memory to control the digital content by:
receiving a request to publish digital text content received at an input field in an electronic document, where the publishing request is associated with the first user node;
in response to the publishing request, determining whether to encrypt the input field text content in the electronic document;
receiving instructions to replace, in the electronic document, the input field text content with an encrypted version of the input field text content based on an encryption policy defined by a controlling entity and prior to uploading the input field text content to web service, wherein the controlling entity includes a policy node that is separate from the first user node;
accessing the policy node;
obtaining the encryption policy and an encryption key from the policy node;
encrypting the input field text content with the encryption key to generate encrypted input field text content;
tagging the encrypted input field text content with a tag that includes an address of the policy node and an identifier of the encryption policy to allow the web service to extract the address of the policy node and the identifier of the encryption policy and obtain a decryption key to decrypt the encrypted input field text content; and
uploading the encrypted input field text content and the tag to the web service.

US Pat. No. 10,551,970

SYSTEM AND METHOD FOR DETECTING IMPERFECTIONS IN A SCREEN

ESW Holdings, Inc., Aust...

1. A method of detecting imperfections on a surface of a touchscreen of an electrical device, comprising:swiping a test object along at least a portion of the touchscreen;
producing, by the touchscreen, an electric signal indicative of the test object's contact with the touchscreen;
receiving an acoustic signal by an acoustic sensor, during the swipe of the test object along the touchscreen;
analyzing, by a processor, at least one of the electric signal and received acoustic signal, wherein the analyzing includes:
referencing an initial group of labeled touchscreens, comprising at least one touchscreen with at least one known imperfection, and at least one touchscreen without imperfections, wherein:
at least one feature has been extracted from an electric signal relating to each touchscreen of the initial group of labeled touchscreens;
each touchscreen of the labeled group of touchscreens has been classified to classes according to said at least one feature;
each class is associated with touchscreens having or not having imperfections;
producing an additional electric signal, from an additional unlabeled touchscreen;
extracting, by a processor, the at least one feature from the additional electric signal of the additional unlabeled touchscreen; and
associating, by a processor, the additional touchscreen with a class of touchscreens having or not having imperfections; and
determining an existence of imperfections on the touchscreen's surface based on the analysis.

US Pat. No. 9,990,516

SECURITY SYSTEMS AND METHODS FOR SOCIAL NETWORKING

ESW Holdings, Inc., Aust...

1. A system for encoding electronic data published by a publishing user node, the system comprising:a processor; and
a memory, coupled to the processor, comprising code stored therein and executable by the processor for:
detecting, via a listener, when an executing browser is about to draw a third party webpage at the publishing user node;
in response to detecting that the third party webpage is about to be drawn, parsing the third party webpage for input at a form input field by:
parsing contents of the third party webpage to detect one or more form input fields;
in response to detecting input at a detected form input field in the third party webpage, assigning a policy ID associated with the detected form input field;
transmitting the policy ID to a policy node to request an encoding key for encoding the input of the detected form input field;
receiving a unique identifier assigned to the detected form input field and the encoding key for encoding the input of the detected form input field; and
in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with the encoded content.

US Pat. No. 10,607,029

SECURITY SYSTEMS AND METHODS FOR ENCODING AND DECODING CONTENT

ESW Holdings, Inc., Aust...

1. A method of content, the method comprising:providing a privacy agent to a client system, wherein the privacy agent when executed by the client system performs:
using a listener, detecting when an executing browser of the client system is about to draw a third party webpage received;
parsing the third party webpage for input at a form input field by:
parsing contents of the third party webpage to detect one or more form input fields;
in response to detecting input at a detected form input field in the third party webpage, assigning a policy ID associated with the detected form input field;
transmitting the policy ID to a policy node to request an encoding key for encoding the input of the detected form input field;
receiving, from the policy node, a unique identifier assigned to the detected form input field and the encoding key for encoding the input of the detected form input field; and
in response to receiving the unique identifier and the encoding key for encoding the input at the detected form input field, encoding the input by replacing the input with the encoded content.