Patent application number | Description | Published |
20150220951 | METHOD AND SYSTEM FOR INFERRING AN INDIVIDUAL CARDHOLDER'S DEMOGRAPHIC DATA FROM SHOPPING BEHAVIOR AND EXTERNAL SURVEY DATA USING A BAYESIAN NETWORK - Disclosed herein is a method for identifying a member of a group with particular demographic characteristics. The method involves identifying purchasing behaviors of members of a group with particular demographic characteristics via market research, gathering transaction data from a financial account of a user at a financial institution for processing transactions of the user with the multiple of merchants, using the market research to set prior probabilities that a user is a member of the group in a Bayesian belief network, analyzing the transaction data of the user via a Bayesian belief network to determine whether the transaction data of the user indicates that the user is an individual member of the group with the particular demographic characteristics, and presenting to the user at least one of an offer and a savings opportunity from a merchant seeking to contact members of the group with the particular demographic characteristics. | 08-06-2015 |
20150220999 | METHOD AND SYSTEM TO DYNAMICALLY ADJUST OFFER SPEND THRESHOLDS AND PERSONALIZE OFFER CRITERIA SPECIFIC TO INDIVIDUAL USERS - A system and method of targeting users with a reward, offer, or incentive may include selecting at least one reward, offer, or incentive to present to a user by applying at least one rule, restriction, or filter dictated by a merchant to the set to be provided to the user, applying at least one rule, restriction, or filter dictated by a financial institution to the set, and applying a filter to the set to obtain those rewards, offers, or incentives with the highest likelihood of being accepted by the user. At least one parameter of the at least one reward, offer, or incentive is adjusted prior to presentation to the user based on a spending trajectory, user propensity model, user profile information or segmentation criteria, or campaign goal. | 08-06-2015 |
Patent application number | Description | Published |
20100040635 | NEUTRALIZING ANTIBODIES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing molecules against influenza A viruses, and to the neutralizing molecules produced. In particular, the invention concerns neutralizing molecules against various influenza A virus subtypes, including neutralizing antibodies against H5 and/or H3 and/or H1, such as, for example all of H1, H3, and H5 subtypes, and methods and means for making such molecules. | 02-18-2010 |
20120093834 | NEUTRALIZING MOLECULES TO VIRAL ANTIGENS - The present invention concerns methods and means for identifying, producing, and engineering neutralizing molecules against influenza A viruses, and to the neutralizing molecules produced. In particular, the invention concerns neutralizing molecules against various influenza A virus subtypes, including neutralizing antibodies against H5 and/or H3 and/or H1, such as, for example all of H1, H3, and H5 subtypes, and methods and means for making such molecules. | 04-19-2012 |
20120128671 | NEUTRALIZING MOLECULES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing antibodies against influenza A viruses, and to the neutralizing antibodies produced. In particular, the invention concerns neutralizing antibodies against various influenza A virus subtypes, and methods and means for making such antibodies. | 05-24-2012 |
20160096882 | NEUTRALIZING MOLECULES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing antibodies against influenza A viruses, and to the neutralizing antibodies produced. In particular, the invention concerns neutralizing antibodies against various influenza A virus subtypes, and methods and means for making such antibodies. | 04-07-2016 |
Patent application number | Description | Published |
20100291066 | DONOR SPECIFIC ANTIBODY LIBRARIES - The present application concerns donor-specific antibody libraries derived from a patient donor who has suffered from, or is suffering from one or more diseases discussed herein. The present application also concerns the method of making and using the donor-specific antibodies. The present application further concerns the neutralizing antibodies obtained from the donor-specific antibody libraries and the methods of using these antibodies for the prevention/treatment of human disease. | 11-18-2010 |
20100316654 | NEUTRALIZING ANTIBODIES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing antibodies against influenza A viruses, and to the neutralizing antibodies produced. In particular, the invention concerns neutralizing antibodies against various influenza A virus subtypes, including neutralizing antibodies against two or more of H1, H2, H3, H5, H7 and H9, such as, for example all of H1, H2, H3, and H5 subtypes, and methods and means for making such antibodies. More specifically, the invention concerns antibodies capable of neutralizing more than one, preferably all, isolates of an influenza A virus subtype. | 12-16-2010 |
20120107326 | NEUTRALIZING ANTIBODIES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing antibodies against influenza A viruses, and to the neutralizing antibodies produced. In particular, the invention concerns neutralizing antibodies against various influenza A virus subtypes, including neutralizing antibodies against two or more of H1, H2, H3, H5, H7 and H9, such as, for example all of H1, H2, H3, and H5 subtypes, and methods and means for making such antibodies. More specifically, the invention concerns antibodies capable of neutralizing more than one, preferably all, isolates of an influenza A virus subtype. | 05-03-2012 |
20120264647 | DONOR SPECIFIC ANTIBODY LIBRARIES - The present invention concerns donor-specific antibody libraries derived from a patient donor who has suffered from, or is suffering from one or more diseases discussed herein. The present invention also concerns the method of making and using the donor-specific antibodies. The present invention further concerns the neutralizing antibodies obtained from the donor-specific antibody libraries and the methods of using these antibodies for the prevention/treatment of human disease. | 10-18-2012 |
20140199682 | INFLUENZA NEUTRALIZING AGENTS - The present invention concerns methods and means for identifying, producing, and engineering neutralizing agents against influenza A viruses, and to the neutralizing agents produced. In particular, the invention concerns neutralizing agents against various influenza A virus subtypes, and methods and means for making such agents. | 07-17-2014 |
20140205614 | NEUTRALIZING ANTIBODIES TO INFLUENZA VIRUSES - The present invention concerns methods and means for identifying, producing, and engineering neutralizing antibodies against influenza A viruses, and to the neutralizing antibodies produced. In particular, the invention concerns neutralizing antibodies against various influenza A virus subtypes, including neutralizing antibodies against two or more of H1, H2, H3, H5, H7 and H9, such as, for example all of H1, H2, H3, and H5 subtypes, and methods and means for making such antibodies. More specifically, the invention concerns antibodies capable of neutralizing more than one, preferably all, isolates of an influenza A virus subtype. | 07-24-2014 |
20150045540 | MULTISPECIFIC STACKED VARIABLE DOMAIN BINDING PROTEINS - The present invention concerns multi-specific stacked variable domain binding proteins. | 02-12-2015 |
Patent application number | Description | Published |
20120123866 | TARGETED ADVERTISING IN A PEER-TO-PEER NETWORK - A method is described including requesting content from a directory service, receiving a list of peers in a peer-to-peer network having the requested content, selecting a peer from the received list of peers, establishing communications with the selected peer, receiving a list of chunks of content and ads available from the selected peer, requesting a chunk of content and ads available from said selected peer and receiving the chunk of content and randomly selected ads from the selected peer. Also described is a method including receiving a request for content, generating a list of chunks of content available for the requested content, generating a list of ads associated with the requested content, transmitting the list of available chunks of content responsive to the request, receiving a request for a selected chunk of content and transmitting the selected chunk of content and ads associated with the selected chunk of content. | 05-17-2012 |
20120323900 | METHOD FOR PROCESSING AUXILARY INFORMATION FOR TOPIC GENERATION - Analyzing auxiliary information associated with a video asset is performed. A topic is then determined from the extracted keywords where the topic is used as a basis of a query to return results such as news articles and other related information that is relevant to the topic of a video asset current being viewed or accessed. These steps are repeated when a topic changes | 12-20-2012 |
20130007057 | AUTOMATIC IMAGE DISCOVERY AND RECOMMENDATION FOR DISPLAYED TELEVISION CONTENT - A method and system are provided that can automatically discover related images and recommend them. It uses images that occur on the same page or are taken by the same photographer for image discovery. The system can also use semantic relatedness for filtering images. Sentiment analysis can also be used for image ranking and photographer ranking. | 01-03-2013 |
20130132842 | SYSTEMS AND METHODS FOR USER INTERACTION - Systems and methods for streaming video, interacting with video content, and sharing video content are disclosed herein. Other embodiments are also disclosed herein. | 05-23-2013 |
20130145023 | PERSONALIZATION OF INFORMATION CONTENT BY MONITORING NETWORK TRAFFIC - A home network system that personalizes the selection of information content in accordance with an interest of a user of the network is disclosed. More specifically, a method and apparatus are described for automatically presenting an information content of interest to the user, being provided by an Internet site external to the network. The contents of interest may be determined in accordance with an access pattern of the user or a frequency of the use of particular topic in the content. | 06-06-2013 |
20140324577 | ANONYMOUS ADVERTISING STATISTICS IN P2P NETWORKS - An advertising statistics collection system employs multiple peers, a signing server and a collection server to ensure peer privacy when the statistics are gathered. A peer relay system aids in providing anonymity for a given peer in a peer-to-peer network environment with little or no trust between communicating parties. Peers are additionally protected by a randomly generated identifier that can be used to globally gather statistics on the peer without revealing the peer's identity. | 10-30-2014 |
20160125472 | GESTURE BASED ADVERTISEMENT PROFILES FOR USERS - The present principles are directed to gesture based advertisement profiles for users. A system includes an advertisement reaction gesture capture device ( | 05-05-2016 |
Patent application number | Description | Published |
20110214147 | Method for determining content for a personal channel - Creating a listing of suggested content and programming for a virtual channel is performed by generating rankings of previously viewed or accessed content. The method determines whether such content is either cyclical in nature as being related to a series or if such content is broadcasted less frequently. Once such rankings are determined, the listings of suggested (other) content will have a number of entries per time segment which represent the highest ranked suggested per time segment | 09-01-2011 |
20130268261 | SEMANTIC ENRICHMENT BY EXPLOITING TOP-K PROCESSING - Proper representation of the meaning of texts is crucial to enhancing many data mining and information retrieval tasks, including clustering, computing semantic relatedness between texts, and searching. Representing of texts in the concept-space derived from Wikipedia has received growing attention recently, due to its comprehensiveness and expertise. This concept-based representation is capable of extracting semantic relatedness between texts that cannot be deduced with the bag of words model. A key obstacle, however, for using Wikipedia as a semantic interpreter is that the sheer size of the concepts derived from Wikipedia makes it hard to efficiently map texts into concept-space. An efficient algorithm is proved which is able to represent the meaning of a text by using the concepts that best match it. In particular, this approach first computes the approximate top- concepts that are most relevant to the given text. These concepts are then leverage to represent the meaning of the given text. | 10-10-2013 |
20140245339 | SYSTEM AND METHOD FOR AUTOMATIC CONTENT PROGRAM DISCOVERY - A system for program information discovery is described. A method and a device for generating and inserting a watermark for such program information discovery into a program signal to be rendered are disclosed, along with the corresponding method and device for watermark detection and decoding from the rendered program signals. Watermark, which carries channel/program information, is encoded and embedded at the set top box where the program streams are received and decoded for rendering. Second screen devices are employed for watermark detection and decoding by capturing the render program signals which has the watermark embedded. The extracted watermark information may be sent to information servers for more detailed channel/program information. | 08-28-2014 |
20160035392 | SYSTEMS AND METHODS FOR CLIPPING VIDEO SEGMENTS - Systems and methods for streaming video, interacting with video content, and sharing video content are disclosed herein. Other embodiments are also disclosed herein. | 02-04-2016 |
Patent application number | Description | Published |
20090252030 | REDUCING TRAFFIC LOSS IN AN EAPS SYSTEM - A ring network with an automatic protection switching domain includes a control VLAN and at least one data VLAN. A master node in the ring is connected to at least one transit node. Each node in the ring network is linked to an adjacent node by a primary port or a secondary port. The master node receives notification of a fault via the control VLAN, the fault indicating a failed link between adjacent nodes. In response, the master node unblocks its secondary port to traffic on the data VLAN(s). The forwarding database entries on the master node and on the transit node(s) are flushed. Data traffic is flooded to the ring network until forwarding database entries on the master node and on the transit node(s) have been reestablished. | 10-08-2009 |
20100054246 | CONVERGENCE OF MULTICAST TRAFFIC - A multicast data packet sent from a source node is received by a transit node. The multicast data packet includes a source address and a multicast group address. A hardware cache miss is detected at the transit node for the multicast data packet. The multicast data packet is hardware-flooded onto ports of the network. The flooding consists of forwarding a copy of the multicast data packet to neighbor nodes of the transit node based on virtual local area network (VLAN) membership. A cache-miss copy of the multicast data packet is sent to an out-of-line processing unit where it is processed in software. The processing includes establishing, via a hardware abstraction layer, a hardware cache entry for the multicast data packet. The cache-miss copy is not forwarded onto the network. | 03-04-2010 |
20100246387 | NETWORK CONVERGENCE IN RESPONSE TO A TOPOLOGY CHANGE - In response to a network topology change, packets are initially flooded on ports of a network device. In addition, a bit array is cleared in response to the topology change. Each bit in the bit array is associated with a particular forwarding entry on the network device. In connection with the clearing of the bit array, the flooding of packets on ports of the network device is made conditional, reducing failover time of the network. | 09-30-2010 |
20120311664 | NETWORK THREAT DETECTION AND MITIGATION - A network switch automatically detects undesired network traffic and mirrors the undesired traffic to a security management device. The security management device determines the source of the undesired traffic and redirects traffic from the source to itself. The security management device also automatically sends a policy to a switch to block traffic from the source. | 12-06-2012 |
20140362709 | SYSTEM AND METHOD FOR BASE TOPOLOGY SELECTION - A system and method for base topology selection includes a network controller including a control unit and one or more ports coupled to the control unit and configured to couple the network controller to one or more network switching devices of a network. The network controller is configured to receive initiation messages from the network switching devices, receive configuration and status messages from the network switching devices, transmit discovery requests to the network switching devices, receive discovery responses from the network switching devices, determine a network topology of the network based on information associated with the initiation messages, the configuration and status messages, and the discovery responses, apply heuristic rules to the network topology, and select a base topology based on results of the applied heuristic rules. The network controller may further be configured to transmit flow control messages to the network switching devices to provision the network consistent with the selected base topology. | 12-11-2014 |
20150199416 | SYSTEM AND METHOD FOR DATA STRUCTURE SYNCHRONIZATION - A system and method for data structure synchronization includes a control unit and a memory coupled to the control unit. The memory stores a first base data structure and a first digest data structure. The control unit maintains the first digest data structure based on the first base data structure and determines whether the first base data structure is in synchronization with a second base data structure. When the first and second base data structures are not in synchronization, the control unit receives a second digest data structure based on the second base data structure, attempts to synchronize the first base data structure to the second base data structure based on differences between the first and second digest data structures, and receives the second base data structure from the second computing device and replaces the first base data structure with the second base data structure when the attempt is not successful. | 07-16-2015 |
20150200803 | SYSTEM AND METHOD FOR NETWORK TOPOLOGY MANAGEMENT - A system and method for network topology management includes a network controller having a control unit and one or more ports coupled to the control unit and configured to couple the network controller to one or more switches of a network. The network controller is configured to divide a physical topology of the network into a plurality of switch subgroups, determine one or more abstracted switch groups for each switch subgroup, select a base topology for each abstracted switch group, configure the each abstracted switch group with a corresponding first forwarding strategy consistent with each selected base topology, determine an abstracted topology for the network based on the physical topology and the each abstracted switch group, and configure the abstracted topology with a second forwarding strategy consistent with the abstracted topology. In some embodiments, the network controller is further configured to monitor the network to determine when a topology change occurs. | 07-16-2015 |
Patent application number | Description | Published |
20120144486 | METHOD AND SYSTEM FOR PROTECTING AGAINST UNKNOWN MALICIOUS ACTIVITIES BY DETECTING A HEAP SPRAY ATTACK ON AN ELECTRONIC DEVICE - A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold. | 06-07-2012 |
20150215336 | METHOD AND SYSTEM FOR PROTECTING AGAINST UNKNOWN MALICIOUS ACTIVITIES BY DETECTING A HEAP SPRAY ATTACK ON AN ELECTRONIC DEVICE - A method and system for protecting against unknown malicious activities by detecting a heap spray attack on a electronic device are disclosed. A script is received at an electronic device from a remote device via a network and a loop operation is detected in the script that contains a write operation operable to write data to a memory of the electronic device. The amount of the data operable to be written to the memory by the write operation is determined and the data is prevented from being written to the memory if the amount of the data is greater than or equal to a threshold. | 07-30-2015 |
20160099951 | CENTRALIZED STORAGE AND MANAGEMENT OF MALWARE MANIFESTS - Updating a central repository with information about malware resident upon a computer system. Upon detecting the malware executing in a virtual machine, a software module, without manual instruction, sends malware manifest data to a central repository over a network. The malware manifest data may comprise a copy of the malware and all versions, including temporary versions, of any files written to, updated by, or accessed by the malware. The central repository may receive, over a network from at least two computer systems, distinct sets of malware manifest data and may subsequently store the sets of malware manifest data. | 04-07-2016 |
20160132351 | MICRO-VIRTUAL MACHINE FORENSICS AND DETECTION - The execution of a process within a VM may be monitored, and when a trigger event occurs, additional monitoring is initiated, including storing behavior data describing the real-time events taking place inside the VM. This behavior data may then be compared to information about the expected behavior of that type of process in order to determine whether malware has compromised the VM. | 05-12-2016 |