Patent application number | Description | Published |
20150100407 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A server system comprising one or more processors and memory obtains user profiles for a plurality of users. In response to receiving profile-update information for a respective user, the server system updates a respective profile of the respective user in accordance with the profile-update information and initiates storage of profile-archive information that enables the server system to obtain a prior version of the respective profile. After updating the respective profile, the server system receives, from a requestor, a request for analysis of message interaction data. In response to receiving the request for analysis of the message interaction data, the server system obtains a message-interaction report that correlates the message interaction data with a set of one or more prior versions of profiles of one or more users that includes the prior version of the respective profile of the respective user and provides the message-interaction report to the requestor. | 04-09-2015 |
20150100408 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A server system comprising one or more processors and memory initiates delivery of a plurality of message campaigns to a plurality of users. A respective message campaign of the plurality of message campaigns includes one or more messages addressed to at least a subset of the plurality of users. The server system receives, from a plurality of client devices associated with the plurality of users, campaign-feedback data, where the campaign-feedback data is indicative of user interaction with the messages transmitted to the plurality of client devices as part of the plurality of message campaigns. After receiving the campaign-feedback data, the server system conditionally transmits, when a transmission criterion is satisfied, to one or more remote storage systems, campaign-tracking data that is based on the campaign-feedback data. | 04-09-2015 |
20150100409 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A server system comprising one or more processors and memory initiates delivery of a respective message campaign that includes one or more messages addressed to a plurality of users. The server system receives, from the plurality of users, campaign-feedback data indicative of user interaction. The campaign-feedback data includes information that enables generation of campaign reports including quantitative information about the message campaigns. After receiving the campaign-feedback data, the server system transmits, to one or more remote storage systems, campaign-tracking data that is based on the campaign-feedback data and then receives, from a requestor, a first request for analysis of the campaign-feedback information. In response to receiving the first request for analysis of the campaign-feedback information, the server system obtains a campaign report generated using the campaign-tracking data from the one or more remote storage systems; and provides the campaign report to the requestor. | 04-09-2015 |
20150100410 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A server system comprising one or more processors and memory initiates delivery of a plurality of message campaigns to a plurality of users that include a first campaign and a second campaign. The server system receives, from a plurality of client devices associated with the plurality of users, campaign-feedback data for the first campaign and the second campaign that is indicative of user interaction with the message campaigns. After receiving the campaign-feedback data, the server system directs storage of campaign-tracking data that corresponds to the campaign-feedback data and then receives, from a requestor, a request for a campaign report for a respective user. In response, the server system obtains a respective campaign report for the respective user that includes information indicative of the respective user's interactions with the first and second campaigns and the server system provides the respective campaign report to the requestor. | 04-09-2015 |
20150100411 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A server system comprising one or more processors and memory receives, from a client device, one or more messages for use in a message campaign, where the one or more messages include a plurality of annotations indicating human-identified features in the one or more messages. The server system initiates delivery of the message campaign to a plurality of users and receives campaign-feedback data that is indicative of user interaction, during the message campaign, that corresponds the features identified by the one or more annotations. After receiving the campaign-feedback data, the server system receives, from a requestor, a request for analysis of the features during the message campaign. In response, the server system obtains a campaign report that provides information on one or more correlations between the features and user interaction with the features during the message campaign and provides the campaign report to the requestor. | 04-09-2015 |
20150100412 | SYSTEM AND METHOD FOR MANAGING MESSAGE CAMPAIGN DATA - A data-management server system comprising one or more processors and memory establishes separate storage areas for first and second data-collection server systems. The data-management server system receives, from the first data-collection server system, first information that corresponds to feedback from a first set of users and excludes information that reveals the identity of individual users in the first set of users and receives, from the second data-collection server system, second information that corresponds to feedback from a second set of users that excludes information that reveals the identity of individual users in the second set of users. The data-management server system stores the first information in a first storage area, stores the second information in a second storage area, and provides access to the first and second information through one or more gatekeeper processes that control access to data received from the data-collection systems. | 04-09-2015 |
20150358259 | OPEN CHANNEL APPLICATION PROGAMMING INTERFACE - Systems and methods for distributing messages are described. In some embodiments, a server system includes one or more processors, and memory storing one or more programs for execution by the one or more processors. The system receives message distribution information, the message distribution information including a channel identifier and a message distribution address. The system receives from a message queue a plurality of messages that correspond to the channel identifier. The plurality of messages is for distribution to a plurality of users through one or more message distribution servers. The system processes the plurality of messages in accordance with the message distribution information; and sends a plurality of processed messages to the message distribution address for distribution to the plurality of users. | 12-10-2015 |
Patent application number | Description | Published |
20080281614 | INTERNET CONTEXTUAL COMMUNICATION SYSTEM - This invention relates to a system and method for presenting to a user relevant areas of distributed computer network sites. In particular, the invention disclosed infers and cross reference user mind sets with data store of potential user goals. The user mind sets indicate a navigational goal of a user over the distributed computer network. In addition, the invention cross-references indicated user goals with data stores of service and service providers providing those services. The invention presents targeted service and service providers to the user across the distributed computer network thereby enabling the user to navigate towards the user goal. | 11-13-2008 |
20110137725 | Internet Contextual Communication System - A computer system for identifying contextually-targeted ads to be displayed with the content of a web page on a display of a user workstation. The system includes a data store for storing a set of rules defining the relevancy of available ads to a number of predetermined structured objects, and a processor configured to apply the set of rules to identify the targeted ads. The processor obtains the content of the web page, extracts keywords from the web page, parses the extracted keywords to form structured objects incorporating the keywords, and applies the set of rules to identify the contextually-targeted ads. | 06-09-2011 |
20140040021 | METHOD AND SYSTEM OF SUBSIDIZING eBOOKS IN EXCHANGE FOR INCLUDING ADVERTISING FROM BRAND IDENTIFIED COMPANIES - A method of one or more sponsors using a computing device connected to a network to subsidize one or more eBook titles including receiving one or more eBook titles and first descriptions of preferred sponsors from first representatives of one or more publishers; receiving brand assets and second descriptions of preferred eBook content from second representatives of the one or more sponsors; selecting based on the first and second descriptions at least one eBook title and at least one sponsor for sponsoring the at least one eBook title; and inserting at least one advertisement formed on a basis of the brand assets received from the at least one sponsor into the at least one selected eBook title to form at least one sponsored eBook edition. | 02-06-2014 |
20140236738 | METHOD AND SYSTEM FOR PLACEMENT AND PRICING OF INTERNET-BASED ADVERTISEMENTS OR SERVICES - Presented are embodiments of methods and systems that provide for Internet advertisement pricing and placement to be variably based on the advertisement's performance within a given category of Internet media, while at the same time achieving predictable delivery and pricing for both advertisers and publishers. Techniques are presented where an advertiser's online campaign will be pre-empted only for underperformance on its own merits, and not for its relative performance or price versus other advertisers. Further, techniques are presented for allowing publishers of advertisements to realize increased revenue from their high value media while using tag passbacks to secure a minimum reserve pricing of their choice. | 08-21-2014 |
Patent application number | Description | Published |
20120330801 | Distributed Malware Detection - According to one embodiment, a computer-implemented method includes accessing, using one or more processing units, a first file of a plurality of files requested to be analyzed for malware. Each of the plurality of files corresponds to a respective remote client of a plurality of remote clients. Further, the method includes: processing, using the one or more processing units, an analysis of the first file for malware; and generating an output comprising an indication of whether the first file comprises malware. The method also includes accessing, using the one or more processing units, an address for a first remote client of the plurality of remote clients. The first remote client is the respective remote client corresponding to the first file. In addition, the method includes: sending, using the one or more processing units, the output in a communication addressed to the first remote client corresponding to the first file. | 12-27-2012 |
20120330863 | System and Method for Sharing Malware Analysis Results - In certain embodiments, a computer-implemented method includes accessing information related to a first file determined to satisfy at least one of a plurality of suspected malware conditions. A first of a number of manager consoles may access the information, each manager console being communicatively coupled to a respective network of a number of networks. A request may be generated for a determination of whether the first file comprises malware. The determination may be conducted at a master manager console. Data may be accessed indicating a result, outputted by the master manager console, of the determination of whether the first file comprises malware. A sharing policy may be accessed and used to determine whether the result is sharable with a second one of the manager consoles. If the result is sharable, a message comprising the result may be generated to be sent to the second manager console. | 12-27-2012 |
20130074185 | Providing a Network-Accessible Malware Analysis - In certain embodiments, a computer-implemented method comprises receiving, via a computer network and from a first computer system, a first malware analysis request. The first malware analysis request comprises a file to be analyzed for malware by a malware analysis system. The method includes initiating a malware analysis by the malware analysis system of the first file for malware. The method includes communicating to the first computer system a response for the first file determined by the malware analysis system to the first computer system. The response comprises an indication of whether the first file comprises malware. | 03-21-2013 |
20130081142 | System, Method, and Logic for Classifying Communications - In accordance with particular embodiments, a method includes intercepting a communication and extracting metadata associated with the communication. The extracted metadata comprises a plurality of different fields from communication metadata and file metadata. The method further includes determining a score, based on previous communications, for each field of the extracted metadata. The score is indicative of a likelihood that the communication is a malicious communication. The method additionally includes combining the scores to generate a combined score for the communication based on an algorithm developed from the previous communications. The method also includes generating, based on the combined score at a first time, a predicted classification as to whether the communication is a malicious communication. The method further includes receiving, at a second time subsequent to the first time, an indication of whether the communication is a malicious communication and updating the algorithm based on the indication. | 03-28-2013 |
20130145466 | System And Method For Detecting Malware In Documents - In one embodiment, a method includes identifying, using one or more processors, a plurality of characteristics of a Portable Document Format (PDF) file. The method also includes determining, using the one or more processors, for each of the plurality of characteristics, a score corresponding to the characteristic. In addition, the method includes comparing, using the one or more processors, the determined scores to a first threshold. Based at least on the comparison of the determined scores to the first threshold, the method includes determining, using the one or more processors, that the PDF file is potential malware. | 06-06-2013 |
20130145471 | Detecting Malware Using Stored Patterns - In one embodiment, a method includes identifying a plurality of portions of a file and comparing the plurality of portions of the file to a plurality of stored patterns. The plurality of stored patterns include portions of known malware. The method also includes determining, from the plurality of portions of the file and based on the comparing of the plurality of portions of the file to the plurality of stored patterns, a set of matching portions. The set of matching portions include one or more of the plurality of portions of the file. In addition, the method includes determining a score for each portion in the set of matching portions and providing information regarding the set of matching portions. The information includes the scores determined for each portion of the set of matching portions. | 06-06-2013 |
Patent application number | Description | Published |
20110219450 | System And Method For Malware Detection - According to one embodiment, a computer-implemented method for execution on one or more processors includes receiving a first file and determining a file type of the first file. The method also includes determining, according to a first policy, a plurality of malware detection schemes to apply to the first file based on the determined file type of the first file. In addition, the method includes scheduling the application of the determined plurality of malware detection schemes to the first file amongst a plurality of detection nodes according to a second policy. Further, the method includes determining, in response to determining the results of applying the plurality of malware detection schemes, that the first file is malware or determining that the first file is suspected malware according to a third policy. | 09-08-2011 |
20110219451 | System And Method For Host-Level Malware Detection - According to one embodiment, a computer-implemented method includes: accessing a set of configuration parameters, accessing a set of identifiers of files known not to be malware, and accessing a set of identifiers of files known to be malware. Further, the method includes: comparing a first file to the set of configuration parameters, determining that a first hash of the first file is not in the set of identifiers of files known not to be malware and that the first hash is not in the set of identifiers of files known to be malware, and sending the at least one file and information related to the at least one file to be analyzed for malware. The method includes deleting the set of configuration parameters, the set of identifiers of files known not to be malware, and the set of identifiers of files known to be malware after sending the first file. | 09-08-2011 |
20120216046 | System and Method for Decrypting Files - In accordance with particular embodiments, a computer-implemented method for execution by one or more processors includes intercepting a communication comprising a message. The method also includes identifying words from within the message. The method further includes storing in a dictionary words from within the message of the communication and one or more parameters of the communication for each of the words. The dictionary comprises a plurality of words from a plurality of intercepted text-based communications. The method also includes receiving an encrypted file that is configured to be decrypted using a password. The method additionally includes identifying words from the dictionary to be used to attempt to decrypt the encrypted file. The identified words are identified based on at least one parameter associated with the encrypted file and the one or more parameters stored in the dictionary. The method further includes attempting to decrypt the encrypted file using at least a portion of the identified words from the dictionary as the password for decrypting the encrypted attachment. | 08-23-2012 |
20120266245 | Multi-Nodal Malware Analysis - A computer-implemented method includes accessing, by an analysis console, information related to a first file received at a first host of a plurality of hosts. Each host is capable of running a corresponding set of malware detection processes. The information includes: an identifier of the first file; and data indicating a first result of the first host applying the set of malware detection processes to the first file. The identifier is generated by the first host and is usable by each of the hosts to determine whether a second file comprises content substantially equivalent to content of the first file. The analysis console generates a first output including: the identifier of the first file; and a second result indicating whether the first file comprises malware. The second result is usable by each of the hosts to determine whether the second file comprises malware. The first output is propagated to the hosts. | 10-18-2012 |