Patent application number | Description | Published |
20090132373 | Revenue Sharing System that Optimizes Ad Revenue with Preformatted Page Generator and Preview Distribution System - The method and system of merges user-supplied electronic content with relevant ads based upon relevancy factors discerned form the ads and the content. Further, profiles and session histories of user-visitors are monitored and ad relevancy factors discerned form the profiles and session histories are employed to obtain user-relevant ads. The content relevant ads and user relevant ads are inserted into a preformed web page in addition to the user-supplied content. A revenue splitting module shares the ad referral or sales revenue from the click throughs to advertiser designated web sites. The relevancy factors relate to one or more of the supplied content, the user who uploaded the content, the user profile (previously input by the user), current session history, past session history, the user-group profiles and any user referral source. A comparator matches relevancy factors and ads. Ad selection by category, hierarchical or orthogonal match and high pay referral fees. | 05-21-2009 |
20090327057 | Revenue Sharing System that Incentivizes Content Providers and Registered Users and Includes Payment Processing - The computer-based method and system shares revenue with a content provider and registered users. A web page has supplied electronic content and ads with displays and hyperlinks to a corresponding advertiser designated web site. Associated sales referral fees are tracked based upon user click throughs. The content provider is incentivized because the system shares the associated sales referral fees with him based upon factors such as frequency of posting content, quality rankings by users, gross value referral fees, and page user-visitors. Registered user-visitors are incentivized by providing each with N quality ranking tokens and by sharing the referral fees with users who post tokens on content. The QA ranking formula accounts for the quantity of posted tokens, the sequential order of posting, the number of user-visitors, and the referral fee to the content provider. The fees are paid to debit card, credit card, or cell phone account payment processors. | 12-31-2009 |
20150120466 | System and Method of Payment for Online Content with Adaptive Value Calculator - The invention calculates, allocates and pays a Content-Provider-CP for online content with an adaptive value calculator, a payment processor computer, memory and associated web-server. The CP allocation in one system is based upon User-CP centric actions or characteristics (A-C); Content centric A-C; Content Performance centric characteristics; and Viewer centric A-C. A compiler registers Users-CPs. An uploader delivers CP content to the web-server. A tracking module monitors views and acclamations on uploaded content. A revenue tracker accounts for revenue sources on the web-server. An allocation processor calculates CP payments. Metric examples are: CP centric (famous CP or frequent CP poster); Content centric (geographically relevant or trending topic); Performance centric (views on published content); Viewer centric (comments by famous critic). A payment module pays the CP through a banking system. Metrics are time-based temporal functions. | 04-30-2015 |
Patent application number | Description | Published |
20080222734 | Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data - The method for securing data includes establishing a group of security sensitive items, filtering data and extracting and separating the security items from remainder data. The filtered data are separately stored (locally on a PC or on another computer in a LAN or WAN or on the Internet.) A map may be generated. The filter and/or map may be destroyed or stored. The data input, extracted data and remainder data may be deleted from the originating computer. Encryption may be utilized to enhance security (including transfers of data, filter and map). Reconstruction of the data is permitted only in the presence of a predetermined security clearance. A plurality of security clearances may be used to enable a corresponding plurality of partial, reconstructed views of the plaintext (omitting higher security words). | 09-11-2008 |
20090178144 | Data Security System and with territorial, geographic and triggering event protocol - The method, program and information processing system secures data, and particularly security sensitive words, characters or data objects in the data, in a computer system with territorial, geographic and triggering event protocols. The method and system determines device location within or without a predetermined region and then extracts security data from the file, text, data object or whatever. The extracted data is separated from the remainder data and stored either on media in a local drive or remotely, typically via wireless network, to a remote store. Encryption is used to further enhance security levels. Extraction may be automatic, when the portable device is beyond a predetermined territory, or triggered by an event, such a “save document” or a time-out routine. Reconstruction of the data is permitted only with security clearance and within certain geographic territories. An information processing system for securing data is also described. | 07-09-2009 |
20090254572 | Digital information infrastructure and method - Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and scarcity designated (S-D) data, each with respective access controls thereat. The SC data stores are is operatively coupled on a network. An identification module for identifying SC data stores for the Sec-D data and S-D data in the server cloud. A processor activates an SC data stores in the server cloud thereby permitting access to the SC data stores and respective Sec-D data and S-D data based upon an application of one or more of said access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and S-D data. | 10-08-2009 |
20100010968 | System and method to identify, classify and monetize information as an intangible asset and a production model based thereon - The method and system identifies and classifies and monetizes intangible asset (I.A.) unstructured digital data in a computer system by ownership characterizations and intellectual property (I.P.) classifications. Enterprise and non-enterprise data collections are searched based upon an expanded project specification (of descriptive functions, characteristics and objectives). Primary search terms from the project are expanded by content, contextual and taxonomic analysis to generate a plurality of search string parameters employed to search the data collections. The search engine returns data and documents, ownership characteristics are ascertained by comparison of the returns and I.P. classifications are made based upon the returns. This process also handles unstructured enterprise specific data not otherwise located in the data collections or unstructured data from other I.A. programs such as H.R. performance modules, supply chain modules or CRM modules. Unstructured data matching an organized data set from project and the search returns is integrated into the organized data set. | 01-14-2010 |
20100250497 | Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor - A method and system processes data in a distributed computing system to survive an electromagnetic pulse (EMP) attack. The computing system has proximal select content (SC) data stores and geographically distributed distal data stores, all with respective access controls. The data input or put through the computing system is processed to obtain the SC and other associated content. The process then extracts and stores such content in the proximal SC data stores and geographically distributed distal SC data stores. The system further processes data to geographically distribute the data with data processes including: copy, extract, archive, distribute, and a copy-extract-archive and distribute process with a sequential and supplemental data destruction process. In this manner, the data input is distributed or spread out over the geographically distributed distal SC data stores. The system and method permits reconstruction of the processed data only in the presence of a respective access control. | 09-30-2010 |
20130304761 | Digital Information Infrastruture and Method for Security Designated Data and with Granular Data Stores - Distributed computer system processes data having select content (SC) represented by one or more predetermined words, characters, etc. The system has a plurality of SC data stores in a server cloud for respective security designated (Sec-D) data and scarcity designated (S-D) data, each with respective access controls thereat. The SC data stores are is operatively coupled on a network. An identification module for identifying SC data stores for the Sec-D data and S-D data in the server cloud. A processor activates an SC data stores in the server cloud thereby permitting access to the SC data stores and respective Sec-D data and S-D data based upon an application of one or more of said access controls thereat. The processor has a reconstruction module operating as a data process employing the respective access controls to combine one or more of the Sec-D data and S-D data. | 11-14-2013 |
20150149491 | Information Infrastructure Management Data Processing Tools With Tags, Configurable Filters and Output Functions - Method of organizing and storing data in an information infrastructure by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works using a tagging routine. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements. Data output is controlled to provide one or more of storage in predetermined data stores, data mining, coping, transfer to other storage sites, supplemental data searches, and presentation subject to data inquiry. | 05-28-2015 |
20150156206 | Information Infrastructure Management Tools With Extractor, Storage and Data Release Control Functions and Segmental Data Stores - Method and system of organizing and processing data in a distributed computing system having designated, distributed data stores for sensitive content (e.g., trade secrets) or select content (e.g., critical content). Sensitive/select data is extracted via configurable filters and stored in the designated data stores, sometimes subject to security controls, with limiting distribution functions and controlled release of the sensitive/select data. Distribution is limited due to designated, configurable filters. | 06-04-2015 |
20150199405 | Information Infrastructure Management Data Processing Tools for Processing Data Flow With Distribution Controls - Method of processing and organizing (sometimes sanitizing) data throughput in an information infrastructure of a distributed computing system with configurable filters. Data stores are created with the data throughput. Filters operate on data to locate, extract, separate and store sensitive content (e.g., trade secrets) or select content (e.g., critical content) in designated, distributed data stores. Configurable filters expand sensitive/select data throughput, contract throughput, inferencing throughput, and hierarchical/orthogonal classifier filters reorganize the sensitive/select data, all to segment and store sensitive/select data in designated stores. Data output enables (a) sanitation; (b) data storage organization; (c) classification; (d) application of data processing (copying, distribution, archiving, etc.). | 07-16-2015 |
20150199410 | Information Infrastructure Management Data Processing Tools With Configurable Data Stores and Data Mining Processes - Method of creating data stores by either processing data throughput or a method for processing data throughput or data mining in a distributed computing system works. The system and method operates on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and applies configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores or to supplement data collections. Sensitive/select data stores may have security clearance requirements. | 07-16-2015 |
20150200967 | Information Infrastructure Management Tools With Variable and Configurable Filters and Segmental Data Stores - Method of creating an information infrastructure for processing data throughput or a method for processing data throughput in a distributed computing system works on sensitive content (e.g., trade secrets) or select content (e.g., critical content) and generates or reduces sensitive/select data with configurable filters (expanding, contracting, hierarchical/orthogonal classifier filters) to separate and store sensitive/select data in designated, distributed data stores. Sensitive/select data stores may have security clearance requirements. | 07-16-2015 |