SG11201507312RA - Risk assessment using social networking data - Google Patents

Risk assessment using social networking data

Info

Publication number
SG11201507312RA
SG11201507312RA SG11201507312RA SG11201507312RA SG11201507312RA SG 11201507312R A SG11201507312R A SG 11201507312RA SG 11201507312R A SG11201507312R A SG 11201507312RA SG 11201507312R A SG11201507312R A SG 11201507312RA SG 11201507312R A SG11201507312R A SG 11201507312RA
Authority
SG
Singapore
Prior art keywords
social networking
risk assessment
networking data
data
assessment
Prior art date
Application number
SG11201507312RA
Inventor
Sunil Madhu
Giacomo Pallotti
Edward J Romano
Alexander K Chavez
Original Assignee
Socure Inc
Sunil Madhu
Giacomo Pallotti
Edward J Romano
Alexander K Chavez
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US201361801334P priority Critical
Application filed by Socure Inc, Sunil Madhu, Giacomo Pallotti, Edward J Romano, Alexander K Chavez filed Critical Socure Inc
Priority to PCT/US2014/030197 priority patent/WO2014145431A1/en
Publication of SG11201507312RA publication Critical patent/SG11201507312RA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24578Query processing with adaptation to user needs using ranking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/32Messaging within social networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/18Network-specific arrangements or communication protocols supporting networked applications in which the network application is adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/12Fraud detection or prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/00505Risk aware, e.g. selecting security levels depending on risk profiles
SG11201507312RA 2013-03-15 2014-03-17 Risk assessment using social networking data SG11201507312RA (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US201361801334P true 2013-03-15 2013-03-15
PCT/US2014/030197 WO2014145431A1 (en) 2013-03-15 2014-03-17 Risk assessment using social networking data

Publications (1)

Publication Number Publication Date
SG11201507312RA true SG11201507312RA (en) 2015-10-29

Family

ID=51535050

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11201507312RA SG11201507312RA (en) 2013-03-15 2014-03-17 Risk assessment using social networking data

Country Status (9)

Country Link
US (4) US9300676B2 (en)
EP (1) EP2973382B1 (en)
CN (1) CN105378790A (en)
AU (2) AU2014233006B2 (en)
HK (1) HK1220534A1 (en)
IL (1) IL241115D0 (en)
SG (1) SG11201507312RA (en)
WO (1) WO2014145431A1 (en)
ZA (1) ZA201506694B (en)

Families Citing this family (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346845B2 (en) 2009-05-15 2019-07-09 Idm Global, Inc. Enhanced automated acceptance of payment transactions that have been flagged for human review by an anti-fraud system
US9773288B2 (en) * 2009-11-17 2017-09-26 Endera Systems, Llc Radial data visualization system
US9786003B2 (en) * 2012-12-11 2017-10-10 Visa International Service Association Prepaid load with account linking
SG11201507312RA (en) 2013-03-15 2015-10-29 Socure Inc Risk assessment using social networking data
US8955129B2 (en) * 2013-04-23 2015-02-10 Duke University Method and system for detecting fake accounts in online social networks
US20150120530A1 (en) * 2013-10-29 2015-04-30 Elwha LLC, a limited liability corporation of the State of Delaware Guaranty provisioning via social networking
US9934498B2 (en) 2013-10-29 2018-04-03 Elwha Llc Facilitating guaranty provisioning for an exchange
US9818105B2 (en) 2013-10-29 2017-11-14 Elwha Llc Guaranty provisioning via wireless service purveyance
US10157407B2 (en) 2013-10-29 2018-12-18 Elwha Llc Financier-facilitated guaranty provisioning
US9507814B2 (en) 2013-12-10 2016-11-29 Vertafore, Inc. Bit level comparator systems and methods
CN104811428B (en) * 2014-01-28 2019-04-12 阿里巴巴集团控股有限公司 Utilize the method, apparatus and system of social networks data verification client identity
US9286467B2 (en) * 2014-04-25 2016-03-15 Bank Of America Corporation Evaluating customer security preferences
US9251335B2 (en) * 2014-04-25 2016-02-02 Bank Of America Corporation Evaluating customer security preferences
US9807182B2 (en) * 2014-04-28 2017-10-31 Palo Alto Networks, Inc. Determination of user reputation regarding data object exposure in cloud computing environments
US9147117B1 (en) 2014-06-11 2015-09-29 Socure Inc. Analyzing facial recognition data and social network data for user authentication
US9747556B2 (en) 2014-08-20 2017-08-29 Vertafore, Inc. Automated customized web portal template generation systems and methods
US10089660B2 (en) * 2014-09-09 2018-10-02 Stc.Unm Online review assessment using multiple sources
CN107004019B (en) * 2014-10-06 2019-05-28 马里有限公司 Unidirectional and bidirectional traffic system and method
KR20170065511A (en) * 2014-10-08 2017-06-13 페이스북, 인크. Facilitating sending and receiving of remittance payments
US9648030B2 (en) * 2014-11-11 2017-05-09 International Business Machines Corporation Identifying an imposter account in a social network
US9544325B2 (en) * 2014-12-11 2017-01-10 Zerofox, Inc. Social network security monitoring
WO2016122441A1 (en) * 2015-01-26 2016-08-04 Hewlett Packard Enterprise Development Lp Authentication of a user
US10354246B1 (en) 2015-03-18 2019-07-16 Square, Inc. Cash transaction machine
US10019760B2 (en) 2015-03-20 2018-07-10 Bank Of America Corporation System for utilizing a retirement score to receive benefits
US10049406B2 (en) 2015-03-20 2018-08-14 Bank Of America Corporation System for sharing retirement scores between social groups of customers
US9654477B1 (en) * 2015-05-05 2017-05-16 Wells Fargo Bank, N. A. Adaptive authentication
US9824351B2 (en) 2015-05-27 2017-11-21 Bank Of America Corporation Providing access to account information using authentication tokens
US9830591B2 (en) 2015-05-27 2017-11-28 Bank Of America Corporation Providing access to account information using authentication tokens
US20160352805A1 (en) * 2015-05-28 2016-12-01 Bizhive, Llc Online reputation monitoring and intelligence gathering
US9967273B2 (en) * 2015-06-15 2018-05-08 Microsoft Technology Licensing, Llc. Abusive traffic detection
CN105225149B (en) * 2015-09-07 2018-04-27 腾讯科技(深圳)有限公司 One kind of credit score determining method and apparatus
US20170111364A1 (en) * 2015-10-14 2017-04-20 Uber Technologies, Inc. Determining fraudulent user accounts using contact information
US9600400B1 (en) 2015-10-29 2017-03-21 Vertafore, Inc. Performance testing of web application components using image differentiation
US9818116B2 (en) 2015-11-11 2017-11-14 Idm Global, Inc. Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud
US9852427B2 (en) * 2015-11-11 2017-12-26 Idm Global, Inc. Systems and methods for sanction screening
US20170171239A1 (en) * 2015-12-11 2017-06-15 Microsoft Technology Licensing, Llc Creating notes on lock screen
US9940482B1 (en) 2015-12-31 2018-04-10 Wells Fargo Bank, N.A. Electronic alerts for confidential content disclosures
US9876825B2 (en) * 2016-02-04 2018-01-23 Amadeus S.A.S. Monitoring user authenticity
WO2017138961A1 (en) * 2016-02-12 2017-08-17 Entit Software Llc Source entities of security indicators
US10360525B1 (en) * 2016-02-16 2019-07-23 Wells Fargo Bank, N.A. Timely quality improvement of an inventory of elements
US10171506B2 (en) * 2016-03-21 2019-01-01 Fortinet, Inc. Network security management via social media network
US10091179B2 (en) * 2016-05-08 2018-10-02 Sap Se User authentication framework
US20170331839A1 (en) * 2016-05-10 2017-11-16 Allstate Insurance Company Cyber-security presence monitoring and assessment
US10320821B2 (en) 2016-05-10 2019-06-11 Allstate Insurance Company Digital safety and account discovery
US9906541B2 (en) 2016-05-10 2018-02-27 Allstate Insurance Company Digital safety and account discovery
US9888007B2 (en) 2016-05-13 2018-02-06 Idm Global, Inc. Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
US10255451B2 (en) * 2016-06-07 2019-04-09 Cisco Technology, Inc. Progressive device lock
CN106095755B (en) * 2016-06-12 2019-02-26 北京师范大学 A kind of fake monitoring and method for early warning based on semantic temporal figure
CN106289369B (en) * 2016-07-17 2018-10-12 合肥赑歌数据科技有限公司 Based on environmental monitoring capacity of statistical systems j2ee
US10372915B2 (en) * 2016-07-29 2019-08-06 Jpmorgan Chase Bank, N.A. Cybersecurity vulnerability management systems and method
US20180089576A1 (en) 2016-09-23 2018-03-29 International Business Machines Corporation Identifying and analyzing impact of an event on relationships
US10187369B2 (en) 2016-09-30 2019-01-22 Idm Global, Inc. Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US10250583B2 (en) 2016-10-17 2019-04-02 Idm Global, Inc. Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
EP3510545A4 (en) * 2016-10-20 2019-07-31 Samsung Electronics Co Ltd System and method for mobile wallet remittance
CN106357702B (en) * 2016-11-28 2019-07-23 浙江工业大学 A kind of system of accountability method for protecting cloud computing privacy
US10348758B1 (en) * 2016-12-02 2019-07-09 Symantec Corporation Systems and methods for providing interfaces for visualizing threats within networked control systems
GB201701560D0 (en) * 2017-01-31 2017-03-15 Digital Fineprint Ltd Data analysis system
WO2018169802A1 (en) * 2017-03-17 2018-09-20 Acxiom Corporation System and method for identifying leaked data and assigning guilt to a suspected leaker
US10313386B1 (en) * 2017-03-28 2019-06-04 Symantec Corporation Systems and methods for assessing security risks of users of computer networks of organizations
WO2018212756A1 (en) * 2017-05-15 2018-11-22 Visa International Service Association Techniques for secure blockchain routing
US10135834B1 (en) * 2017-10-20 2018-11-20 Social Patent LLC System and method of executing operations in a social network application

Family Cites Families (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NO172872B (en) 1990-10-17 1993-06-07 Geco As Device for seismic energy sources
US6529864B1 (en) * 1999-08-11 2003-03-04 Roedy-Black Publishing, Inc. Interactive connotative dictionary system
US20060009994A1 (en) * 2004-07-07 2006-01-12 Tad Hogg System and method for reputation rating
US8010460B2 (en) 2004-09-02 2011-08-30 Linkedin Corporation Method and system for reputation evaluation of online users in a social networking scheme
EP1856639A2 (en) 2005-03-02 2007-11-21 Markmonitor, Inc. Distribution of trust data
US20130304818A1 (en) * 2009-12-01 2013-11-14 Topsy Labs, Inc. Systems and methods for discovery of related terms for social media content collection over social networks
US20130212655A1 (en) 2006-10-02 2013-08-15 Hector T. Hoyos Efficient prevention fraud
US8316086B2 (en) 2009-03-27 2012-11-20 Trulioo Information Services, Inc. System, method, and computer program product for verifying the identity of social network users
CN101938711B (en) * 2009-06-30 2015-09-09 国际商业机器公司 Method and apparatus for the detection of spam messages
US8225413B1 (en) * 2009-06-30 2012-07-17 Google Inc. Detecting impersonation on a social network
US8670597B2 (en) 2009-08-07 2014-03-11 Google Inc. Facial recognition with social network aiding
US9070146B2 (en) * 2010-02-04 2015-06-30 Playspan Inc. Method and system for authenticating online transactions
US8825759B1 (en) * 2010-02-08 2014-09-02 Google Inc. Recommending posts to non-subscribing users
US8533110B2 (en) * 2010-06-29 2013-09-10 Sociogramics, Inc. Methods and apparatus for verifying employment via online data
US20110320342A1 (en) 2010-06-29 2011-12-29 Sociogramics, Inc. Methods and systems for improving timely loan repayment by controlling online accounts, notifying social contacts, using loan repayment coaches, or employing social graphs
US20120136866A1 (en) * 2010-11-30 2012-05-31 International Business Machines Corporation Assisting users to interact appropriately to conform to the norm of the social networking group
US8918904B2 (en) 2010-12-17 2014-12-23 Wepay, Inc. Systems and methods for user identity verification and risk analysis using available social and personal data
US20120166285A1 (en) 2010-12-28 2012-06-28 Scott Shapiro Defining and Verifying the Accuracy of Explicit Target Clusters in a Social Networking System
US20120226579A1 (en) 2011-03-01 2012-09-06 Ha Vida Fraud detection based on social data
US9069945B2 (en) * 2011-03-04 2015-06-30 Puneet Singh User validation in a social network
US20120278176A1 (en) * 2011-04-27 2012-11-01 Amir Naor Systems and methods utilizing facial recognition and social network information associated with potential customers
US8646073B2 (en) * 2011-05-18 2014-02-04 Check Point Software Technologies Ltd. Detection of account hijacking in a social network
US20120310831A1 (en) * 2011-06-02 2012-12-06 Visa International Service Association Reputation management in a transaction processing system
US8917913B2 (en) 2011-09-22 2014-12-23 International Business Machines Corporation Searching with face recognition and social networking profiles
US9087273B2 (en) 2011-11-15 2015-07-21 Facebook, Inc. Facial recognition using social networking information
US9082011B2 (en) 2012-03-28 2015-07-14 Texas State University—San Marcos Person identification using ocular biometrics with liveness detection
US8891883B2 (en) 2012-05-15 2014-11-18 Google Inc. Summarizing a photo album in a social network system
US8457367B1 (en) 2012-06-26 2013-06-04 Google Inc. Facial recognition
US20140007224A1 (en) 2012-06-29 2014-01-02 Ning Lu Real human detection and confirmation in personal credential verification
US9262615B2 (en) 2012-07-11 2016-02-16 Daon Holdings Limited Methods and systems for improving the security of secret authentication data during authentication transactions
US20140041055A1 (en) 2012-08-06 2014-02-06 Avaya Inc. System and method for online access control based on users social network context
US8437513B1 (en) 2012-08-10 2013-05-07 EyeVerify LLC Spoof detection for biometric authentication
US9471838B2 (en) 2012-09-05 2016-10-18 Motorola Solutions, Inc. Method, apparatus and system for performing facial recognition
US8914454B1 (en) * 2012-10-05 2014-12-16 Hearsay Social, Inc. Verification of social media data
CN102945258B (en) * 2012-10-18 2016-01-20 北京淘友天下科技发展有限公司 Social network users to obtain a method and system reliability
US20140150109A1 (en) * 2012-11-29 2014-05-29 B. G. Negev Technologies And Applications Ltd. Method for protecting user privacy in social networks
US9178883B2 (en) * 2012-12-12 2015-11-03 SocialSign.in, Inc. Leveraging online identities to grant access to private networks
US8973100B2 (en) * 2013-01-08 2015-03-03 Facebook, Inc. Trust-based authentication in a social networking system
SG11201507312RA (en) 2013-03-15 2015-10-29 Socure Inc Risk assessment using social networking data
US20140324719A1 (en) * 2013-03-15 2014-10-30 Bruce A. Canal Social media screening and alert system
US9807049B2 (en) * 2013-05-24 2017-10-31 erodr, Inc. Systems and methods to present messages in location-based social networking communities
US20150067061A1 (en) * 2013-08-30 2015-03-05 Milyoni, Inc. Systems and methods for predicting and characterizing social media effectiveness
US9147117B1 (en) 2014-06-11 2015-09-29 Socure Inc. Analyzing facial recognition data and social network data for user authentication

Also Published As

Publication number Publication date
WO2014145431A1 (en) 2014-09-18
HK1220534A1 (en) 2017-05-05
US20190014142A1 (en) 2019-01-10
CN105378790A (en) 2016-03-02
AU2017228607A1 (en) 2017-10-05
US9942259B2 (en) 2018-04-10
US10313388B2 (en) 2019-06-04
US20160203575A1 (en) 2016-07-14
EP2973382A1 (en) 2016-01-20
US20140282977A1 (en) 2014-09-18
US20170111385A1 (en) 2017-04-20
AU2014233006B2 (en) 2017-06-15
US9558524B2 (en) 2017-01-31
ZA201506694B (en) 2017-11-29
EP2973382B1 (en) 2019-07-17
IL241115D0 (en) 2015-11-30
EP2973382A4 (en) 2016-11-16
US9300676B2 (en) 2016-03-29
AU2014233006A1 (en) 2015-10-08

Similar Documents

Publication Publication Date Title
TWI541815B (en) Data shifting
ES2721014T3 (en) Small data communications
GB201311001D0 (en) Lucabella
EP2941754A4 (en) Social media impact assessment
GB201413149D0 (en) No details
ZA201506694B (en) Risk assessment using social networking data
PL2953956T3 (en) Heteropolyoxometalates
GB201404501D0 (en) Secure data management
GB201404457D0 (en) Data clustering
TWI514132B (en) Data synchronization
EP2891131A4 (en) Real-world view of location-associated social data
SG11201505742PA (en) Data security service
IL243539A (en) Large scale page recommendations on online social networks
GB201419194D0 (en) Data syncronisation
EP2956901A4 (en) Activity cards
HK1220454A1 (en) Pyridin-4-yl derivatives -4-
GB201314421D0 (en) Data Processing
IL240626D0 (en) Social context for applications
TWI549556B (en) Communication techniques
EP2957205A4 (en) Hand-dryer
GB201309702D0 (en) Security
GB2517016B (en) Secure data storage
GB201305796D0 (en) Aparatus and methods for small data transmission
TWI620089B (en) Secure computer
TWI529516B (en) Server