Patent application number | Description | Published |
20110288941 | CONTEXTUAL CONTENT ITEMS FOR MOBILE APPLICATIONS - This specification describes technologies relating to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a request to serve a content item to an application on a mobile device; identifying a context associated with the application, the context being derived from an application description page for the application and one or more pages linking to the application description page, the context comprising one or more keywords associated with the application; selecting a content item, from a collection of content items, using the context; and serving the selected content item to the application on the mobile device. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products. | 11-24-2011 |
20110307323 | CONTENT ITEMS FOR MOBILE APPLICATIONS - This specification relates to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include actions of receiving a request to serve a content item to an application on a mobile device, the application being associated with one or more categories; for each of a plurality of content items in a collection of content items, identifying a performance signal for the content item, the performance signal representing the performance of the content item when served to one or more other mobile devices running the application and one or more other applications associated with one of the one or more categories; selecting, using one or more processors, a first content item from the plurality of content items based on the performance signals of the plurality of content items; and providing the first content item to the application on the mobile device. | 12-15-2011 |
20110321167 | AD PRIVACY MANAGEMENT - In general, this specification relates to content presentation. In general, one aspect of the subject matter described in this specification can be embodied in methods that include the actions of receiving a privacy request from a mobile device, the privacy request including an encoded device identifier; authenticating the request; decoding the device identifier; retrieving mobile device advertising data associated with the decoded device identifier; and applying the privacy request to the mobile device advertising data. Other embodiments of this aspect include corresponding systems, apparatus, and computer program products. | 12-29-2011 |
20120185334 | LOCAL AD SERVING - In general, this specification relates to content presentation. The subject matter of this specification can be embodied in, among other things, methods that include the actions of receiving a group of content items at a user device, the content items configured for presentation to a user in association with other content, each content item of the group of content items including metadata associated with the content item; identifying a request from an application of the user device to present a content item in association with particular content; selecting, using one or more processors, a content item from the group of content items using the metadata for the content items along with local targeting information; and presenting the selected content item. | 07-19-2012 |
20140094193 | NUMBER IDENTIFICATION AND TAGGING - Methods, systems, and apparatus, including computer programs encoded on computer storage media, for number identification and tagging. One of the methods includes identifying a content item to be provided to a mobile device. The method includes identifying a location of the mobile device. The method includes identifying at least one calling format based on the location. The method includes identify a calling number included in the content item based on the at least one calling format. The method includes generating an altered version of the content item to tag the calling number. The method also includes provide the altered version to the mobile device. | 04-03-2014 |
20140114773 | ADVERTISING INVENTORY ALLOCATION - A simultaneous ascending price auction (“SAA”) can be used to allocate advertising inventory to bidders. The advertising inventory can be, for example, radio or television advertisement spots (“spots”). The bidders can be advertisers that can provide advertisements for presentation in the spots. Two or more contiguous spots can define an advertising block. Spots or advertising blocks can be allocated to advertisers by the SAA mechanism based on bid criteria. The SAA can perform simultaneous advertisement scheduling and pricing. The auction allocation can be optimized to facilitate efficient allocation of advertisements to spots or blocks. | 04-24-2014 |
20140222571 | DIRECTING COMMUNICATIONS TO SEMANTIC BUNDLES OF LOCATIONS - A system and a computer-implemented method of serving online content items using a semantic description of a feature that is common to a plurality of online content locations are provided. The method includes assigning one or more identifications based on the semantic descriptions to each of the plurality of online content locations using one or more features associated with a respective one of the online content locations, receiving a selection of one or more of the assigned identifications and a physical location of the associated online content locations, determining at least one of a physical location of an online content recipient, and an intended location of the online content recipient, and transmitting an online content item to the online content recipient when the online content recipient is within a specified distance from any of the selected online content locations. | 08-07-2014 |
20140270233 | COMMUNICATING VIA A BODY-AREA NETWORK - In a first example of “Body-Area Networking” (“BAN”), a user wishing to access his electronic device ingests a small pill carrying a transmitter. The transmitter's signal carries an identification code that traverses the user's BAN and is read by the device. If the device recognizes that identification code as authenticate, then the device grants the user the desired access. In another example, the user again swallows a transmitter. When the user shakes hands with another person, the signal originating at the ingested transmitter is carried across the BAN of the first user, travels across the handshake to the BAN of the second user, then traverses the second user's BAN to her device. In a third example, a media player transmits audio information across the BAN to a headset worn by the user. The headset receives the signal, demodulates it, and renders the audio to the user. | 09-18-2014 |
20140273829 | COMMUNICATING VIA A BODY-AREA NETWORK - In a first example of “Body-Area Networking” (“BAN”), a user wishing to access his electronic device ingests a small pill carrying a transmitter. The transmitter's signal carries an identification code that traverses the user's BAN and is read by the device. If the device recognizes that identification code as authenticate, then the device grants the user the desired access. In another example, the user again swallows a transmitter. When the user shakes hands with another person, the signal originating at the ingested transmitter is carried across the BAN of the first user, travels across the handshake to the BAN of the second user, then traverses the second user's BAN to her device. In a third example, a media player transmits audio information across the BAN to a headset worn by the user. The headset receives the signal, demodulates it, and renders the audio to the user. | 09-18-2014 |
20140283017 | COMMUNICATING VIA A BODY-AREA NETWORK - In a first example of “Body-Area Networking” (“BAN”), a user wishing to access his electronic device ingests a small pill carrying a transmitter. The transmitter's signal carries an identification code that traverses the user's BAN and is read by the device. If the device recognizes that identification code as authenticate, then the device grants the user the desired access. In another example, the user again swallows a transmitter. When the user shakes hands with another person, the signal originating at the ingested transmitter is carried across the BAN of the first user, travels across the handshake to the BAN of the second user, then traverses the second user's BAN to her device. In a third example, a media player transmits audio information across the BAN to a headset worn by the user. The headset receives the signal, demodulates it, and renders the audio to the user. | 09-18-2014 |
20150019892 | LOW-POWER NEAR-FIELD COMMUNICATION AUTHENTICATION - This document describes techniques ( | 01-15-2015 |