Patent application number | Description | Published |
20090076886 | ADVERTISEMENT PLUSBOX - A first query including one or more keywords is received, and content associated with the one or more keywords is identified. A second query including the one or more keywords is received, and a product or service associated with the sponsored content is identified based on the one or more keywords. Information associated with the product/service is stored, and a selection is received from a display device indicating a request to display the information associated with the product/service. The information associated with the product/service is provided to the display device. | 03-19-2009 |
20110161161 | MULTI-CAMPAIGN CONTENT ALLOCATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for creating experiment content distribution campaigns (“experiment campaign”) and allocating content in accordance with the experiment campaign. In one aspect, a control campaign or an experiment campaign are selected as an available campaign for providing content in response to receiving a content request. The selection can be a probability constrained selection where the probability with which the experiment campaign is selected is specified as a portion of a total number of requests received during an experiment period for which the experiment campaign is available to provide content. Content is provided in response to the request, where the provided content being content corresponding to the selected campaign. | 06-30-2011 |
20110161407 | MULTI-CAMPAIGN CONTENT ALLOCATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for creating experiment content distribution campaigns (“experiment campaign”) and allocating content in accordance with the experiment campaign. In one aspect, a control campaign or an experiment campaign are selected as an available campaign for providing content in response to receiving a content request. The selection can be a probability constrained selection where the probability with which the experiment campaign is selected is specified as a portion of a total number of requests received during an experiment period for which the experiment campaign is available to provide content. Content is provided in response to the request, where the provided content being content corresponding to the selected campaign. | 06-30-2011 |
20130254015 | MULTI-CAMPAIGN CONTENT ALLOCATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for creating experiment content distribution campaigns (“experiment campaign”) and allocating content in accordance with the experiment campaign. In one aspect, a control campaign or an experiment campaign are selected as an available campaign for providing content in response to receiving a content request. The selection can be a probability constrained selection where the probability with which the experiment campaign is selected is specified as a portion of a total number of requests received during an experiment period for which the experiment campaign is available to provide content. Content is provided in response to the request, where the provided content being content corresponding to the selected campaign. | 09-26-2013 |
Patent application number | Description | Published |
20100020972 | Wireless mobile device that permits toggling of whether to transmit information contained in SMS messages as encrypted or clear text - An exemplary method is implemented by a wireless mobile device that transmits and receives short message system (SMS) text messages. Entered first text to be transmitted as a first SMS text message from the wireless mobile device is accepted and stored by a resident application. A user selectable input is received by the resident application of the wireless mobile device, where the user selectable input controls whether a resident encryption algorithm will be used to convert the first text into an encrypted first text message. A user control input is received by the resident application that causes the transmission of the first SMS text message from the wireless mobile device. The text of the transmitted first SMS text message contains the first text if the resident encryption algorithm is not selected by the user. The text of the transmitted first SMS text message contains encrypted first text if the resident encryption algorithm is selected by the user. | 01-28-2010 |
20100024010 | Mobile device with customizable login screen - An exemplary method controls the display of information on the screen of a mobile device during a request for login information. Independently controlled regions of the screens are used to concurrently convey different information associated with each region to a user of the mobile device during the rendering of a login request that is contained in one of the regions. | 01-28-2010 |
20100024020 | Wireless mobile device with privacy groups that independently control access to resident application programs - An exemplary method implemented by a wireless mobile device controls user access to programs and files defining items that are resident on the mobile device. A first icon associated with a corresponding first program installed on the wireless mobile device is displayed on the screen of the wireless mobile device, where the first icon can be seen by any person using the wireless mobile device and the corresponding first program is available for execution to said person. A privacy gate and a corresponding privacy icon displayed on the screen are created using a privacy interface program installed on the wireless mobile device. A password associated with the privacy gate is entered by a first user so that a subsequent request by a user to traverse the privacy gate will require entry of this password. The first program and the privacy gate are linked so that a user must traverse the privacy gate in order to execute the first program. | 01-28-2010 |
20100024028 | Wireless mobile device with user selectable privacy for groups of resident application programs and files - An exemplary method implemented by a wireless mobile device provides user selectable access to programs and files defining items that are resident on the mobile device. Screen icons associated with a privacy group are visually differentiated from icons associated with a public group. On receiving a user first input to initially access one of the items, where the first input is the first attempt by the user to access any item since a power up activation of the mobile device, determining whether the first input is a request to access an item associated with the privacy group or public group. If the sought access is to one item associated with the privacy group, a request is displayed on the screen requesting the user to enter a predetermined group privacy password and access is inhibited to the item unless the predetermined group privacy password is input to the mobile device by the user. The same predetermined group privacy password is required to initially access any of the items associated with the privacy group. If the sought access is to one item associated with the public group, the first user input is permitted to be conveyed to the associated one item causing the one item associated with the public group to be accessed without requiring an input by the user of the group privacy password. | 01-28-2010 |
20100162387 | Mobile device with separate access to private and public information stored in the device - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Public records are stored in a public contact database in the mobile device, the public records containing public contact information for persons. Public contact information contained in a public record corresponding to a person selected by a public user is displayed upon the request of any public user of the device. Private records are stored in a private contact database in the mobile device, the private records containing private contact information for persons. Upon a valid password being received by the device from a private user, access to the private contact information is provided to the private user. In response to the receipt of a request from the private user, private contact information for a selected person from a corresponding private record is displayed on the screen of the mobile device. | 06-24-2010 |
20100162388 | Wireless mobile device with automatic segregation of received messages for private and public access - An exemplary method is implemented by a wireless mobile device that transmits and receives text-based messages. Received messages are stored in memory of the wireless mobile device. Based on a privacy criteria stored in the memory, some of the received messages are automatically identified as public and others of the received messages are automatically identified as private. Access is provided to stored received messages that are designated as public to any user of the mobile device. Access is provided to stored received messages that are designated as private only after receipt of a password entered by a user of the wireless mobile device that permits access to the privately identified messages. | 06-24-2010 |
Patent application number | Description | Published |
20120328860 | Multi-zone microstructure spring - A method to create a multi-zone microstructure spring includes releasing a buckling layer from a substrate, wherein the buckling layer displaces into a curved shape after the releasing. The buckling layer is displaced, relative to the substrate, through at least one of a first zone, a second zone, and a third zone, wherein the buckling layer provides positive stiffness in the first zone, zero stiffness in a second zone, and negative stiffness in a third zone, and the buckling layer must pass through the first zone to reach the second zone and the buckling layer must pass through the second zone to reach the third zone. A multi-zone microstructure spring includes a substrate and a buckling layer. The buckling layer has a surface area. The buckling layer has a positive stiffness in a first zone, zero stiffness in a second zone, and a negative stiffness in a third zone. The buckling layer must pass through the first zone to reach the second zone and the buckling layer must pass through the second zone to reach the third zone. The buckling layer is connected to the substrate. The microstructure includes an elastic connection. The elastic connection is in contact with the buckling layer over a fraction of the buckling layer's surface area. | 12-27-2012 |
20130008769 | Reduced stiffness micro-mechanical structure - Apparatuses and method are described to create a reduced stiffness microstructure (RSM). A RSM is made by forming a first buckled membrane along a first buckling direction and forming a second buckled membrane along a second buckling direction. The second buckling direction is opposite to the first buckling direction and the first buckled membrane is in contact with the second buckled membrane over a contact area. Within an operating zone, a stiffness of the reduced stiffness microstructure spring is less than an absolute value of a stiffness of either the first buckled membrane or the second buckled membrane when the contact area translates along either one of the buckling directions. In the operating zone the stiffness can approach or equal zero. | 01-10-2013 |
20130193930 | Energy harvesting with a micro-electro-machanical system (MEMS) - Apparatuses and method are described to create an energy harvesting microstructure, referred to herein as a transduction micro-electro mechanical system (T-MEMS). A T-MEMS includes a substrate, a first buckled membrane, the first buckled membrane has a buckling axis and is connected to the substrate. The first buckled membrane further includes a transduction material, a first conductor, the first conductor is applied to a first area of the transduction material; and a second conductor, the second conductor is applied to a second area of the transduction material, wherein electrical charge is harvested from the transduction material when the first buckled membrane is translated along the buckling axis. | 08-01-2013 |
Patent application number | Description | Published |
20090060188 | DETERMINING SECURITY STATES USING BINARY OUTPUT SEQUENCES - A system for determining security associations using binary output sequences is described. In an example systematic embodiment, a first device is coupled over a network to a second device. Each device includes a processor and an indicator mechanism coupled to the processor. The indicator mechanism is configured to output a binary representation of a security state established between the devices to a user in perceivable proximity to at least one of the devices. A computer readable storage medium is coupled to the processor and includes executable instructions for the processor. The instructions when executed by the processor initiate a security transaction between the devices. The security transaction includes a protocol that uses one or more public keys to establish a security state between the devices. The indicator mechanism then outputs the binary representation to the user based on the established security state. | 03-05-2009 |
20100064137 | Inspection and rewriting of cryptographically protected data from group VPNs - Systems, methods, and other embodiments associated with processing secure network traffic are described. One example method includes determining whether a device is a preconfigured member of a group key system. If the device is not a preconfigured member then the method selectively establishes membership in the group key system by requesting membership from a group controller. The example method may also include receiving a set of keys from the group controller and being assigned a role by the group controller. The method may further include processing secure network traffic as an inspection point, a rewriting point, and/or a validation point based on the received set of keys and the assigned role(s). | 03-11-2010 |
20120284371 | Reducing Fetching Load on Cache Servers in Adaptive Streaming - In one embodiment, a method that receives at a cache server device a request from a client device for a first representation of a content chunk; determines whether the first representation is available at the cache server device; responsive to determining that the first representation is available at the cache server device, provides the first representation to the client device; responsive to determining that the first representation is unavailable at the cache server device, determines whether a congestion-like condition is present in an upstream network; and responsive to determining that the congestion-like condition is present in the upstream network, provides a second representation of the content chunk. | 11-08-2012 |