61
Edna Segal, Alon Segal: Portable cellular phone system having remote voice recognition. Telespree Communications, Michael A Glenn, Glenn Patent Group, December 28, 2004: US06836651 (91 worldwide citation)

A portable cellular phone system is provided, wherein matched sets of algorithmically generated communication units are generated, each defining an increment of authorized communication. One set is stored on a system server, i.e. a service provider, and the pre-paid set is available for use within a ...


62
Geoffrey Cooper, Kieran G Sherlock, Bob Shaw, Luis Valente: Credential/condition assertion verification optimization. Securify, Michael A Glenn, Glenn Patent Group, March 22, 2005: US06871284 (88 worldwide citation)

A method and apparatus ascertain which credential and which condition both from a network security policy best describe, respectively, information about initiator and target principals involved in an interaction, and tests performed on a state of an associated protocol event.


63
Jürgen Herre, Eric Allamanche, Oliver Hellmuth, Thorsten Kastner, Markus Cremer: Method and apparatus for producing a fingerprint, and method and apparatus for identifying an audio signal. M2ANY, Michael A Glenn, Glenn Patent Group, December 2, 2008: US07460994 (87 worldwide citation)

For producing a fingerprint of an audio signal, use is made of information defining a plurality of predetermined fingerprint modi, all of the fingerprint modi relating to the same type of fingerprint, the fingerprint modi, however, providing different fingerprints differing from each other with rega ...


64
Geoffrey Cooper, Luis Filipe Pereira Valente, Derek P Pearcy, Harry Alexander Richardson: Policy-based vulnerability assessment. Securify, Michael A Glenn, Glenn Patent Group, November 11, 2008: US07451488 (86 worldwide citation)

A system and method for a vulnerability assessment mechanism that serves to actively scan for vulnerabilities on a continuous basis and interpret the resulting traffic in context of policy is provided. Vulnerability information is presented within an enterprise manager system enabling the user to ac ...


65
James Stephanick, Christina James, Ethan R Bradford, Michael R Longé: Selective input system based on tracking of motion parameters of an input device. Tegic Communications, Michael A Glenn, Glenn Patent Group, July 6, 2010: US07750891 (84 worldwide citation)

A selective input system and associated method is provided which tracks the motion of a pointing device over a region or area. The pointing device can be a touchpad, a mouse, a pen, or any device capable of providing two or three-dimensional location. The region or area is preferably augmented with ...


66
Russell Anderson, Larry S Peranich, Ricardo Dungca, Joseph P Milana, Xuhui Shao, Paul C Dulany, Khosrow M Hassibi, James C Baker: Detecting and measuring risk with predictive models using content mining. Fair Isaac Corporation, Michael A Glenn, Glenn Patent Group, May 20, 2008: US07376618 (84 worldwide citation)

Computer implemented methods and systems of processing transactions to determine the risk of transaction convert high categorical information, such as text data, to low categorical information, such as category or cluster IDs. The text data may be merchant names or other textual content of the trans ...


67
David Leigh Donoho, David Salim Hindawi, Lisa Ellen Lippincott: Relevance clause for computed relevance messaging. Bigfix, Michael A Glenn, Glenn Patent Group, October 2, 2007: US07277919 (83 worldwide citation)

The invention disclosed herein enables a collection of computers and associated communications infrastructure to offer a new communications process which allows information providers to broadcast information to a population of information consumers. The information may be targeted to those consumers ...


68
Jai Rawat, Samir Palnitkar: Method and system of implementing recorded data for automating internet interactions. Obongo, Michael A Glenn, Glenn Patent Group, December 27, 2005: US06981028 (83 worldwide citation)

A method and system of implementing recorded data for automating interactions which occur across the Internet includes storing data at a central Web server adapted for maintaining a database. Responsive to a program script requesting data, computer program code at the central Web server selectively ...


69
Geoffrey Cooper, Robert Allen Shaw, Luis Filipe Pereira Valente, Kieran Gerard Sherlock: Network monitor internals description. Securify, Michael A Glenn, Glenn Patent Group, September 18, 2007: US07272646 (80 worldwide citation)

A method and apparatus for a network monitor internals mechanism that serves to translate packet data into multiple concurrent streams of network event data is provided. The data translation is accomplished by interpreting both sides of each protocol transaction.


70
Walter W Lee, Daniel Shoham, Wesley K Wilhelm, Joseph P Milana, Alan P Jost: Score based decisioning. Fair Isaac Corporation, Michael A Glenn, Robert Sachs, Glenn Patent Group, July 31, 2007: US07251624 (77 worldwide citation)

The invention aids an entity to selectively request additional data about a user to serve the needs of the entity without causing the user to have an adverse reaction. The invention helps an entity to determine the condition under which to request additional data so as to reduce the likelihood of ca ...