Patent application number | Description | Published |
20140100968 | DETERMINING BIDDER-AWARE VALUES FOR CONFIGURABLE AUCTION PARAMETERS - Systems, methods, and computer-readable storage media are provided for determining configurable auction parameters based upon historic auction information that includes identities of auction participants or bidders. Such configurable auction parameters specify values to be applied for particular auction parameters (e.g., floor price), at the time of an auction for available advertising space, when one or more of the auction participants are associated with specified identities. Further provided are systems and methods for, at the time of an auction for available advertising space, determining auction parameter values in accordance with configurable auction parameters. | 04-10-2014 |
20140282825 | MANAGING POLICY AND PERMISSIONS PROFILES - Systems, methods, and computer-readable storage media are provided for managing policy and permissions profiles. Individuals or organizations are permitted to author profiles utilizing a profile template and publish such authored profiles for access and adoption by others. Users are able to import desired profiles and subsequently have those imported profiles applied each time he or she accesses an application or service to which the profile pertains. User interfaces from which users may view profiles associated with them, make alterations to settings of profiles associated with them, and/or select from a plurality of profiles for a particular application or service are also provided. Still further, recommendations may be provided to users for policy and permissions profiles based upon, for instance, crowd-sourcing, profiles adopted by social network connections of a user or other users that are “like” a user, prior profile selections made by the user, and/or prior user behavior. | 09-18-2014 |
Patent application number | Description | Published |
20140149192 | VERIFICATION OF ONLINE ADVERTISEMENT SECURITY - Online advertisements may be verified before being rendered. In one example, an ad control is incorporated into an application or web page. When the ad control is to present an ad, the ad control requests an ad from an ad provider. Upon receipt of the ad, the ad control generates one or more hashes from the ad, and may extract one or more landing pages from the ad. The ad control then submits the one or more hashes, and the URLs of the one or more landing pages, to a reputation service for verification. The reputation service may then determine whether the ad and/or its landing pages are acceptable, and returns an “OK” or “not OK” message accordingly. If the ad and its landing pages are determined to be acceptable, then the ad control renders the ad. Otherwise, the ad control requests a new ad from the ad provider. | 05-29-2014 |
20140172587 | DYNAMIC FLOOR PRICES IN SECOND-PRICE AUCTIONS - Systems, methods, and computer storage media having computer-executable instructions embodied thereon that dynamically set floor prices in a second price auction for impressions or events. Advertiser bids for the impressions or events are received by the computer system and used to create a statistical distribution. The advertiser with the highest bid for an impression or event is identified. The statistical distribution excludes bids received from the advertiser having the highest bid. The computer system sets a floor price for the impression or event. The floor price is based on the statistical distribution. The advertiser is charged the maximum of the floor price or the second highest bid received from another advertiser for the same impression. The advertisement associated with the advertiser having the highest bid is selected for display in a webpage that corresponds to the impression or event. | 06-19-2014 |
20140180835 | DIGITAL SIGNATURES FOR ONLINE ADVERTISEMENT SECURITY - Online advertisements may be verified before being rendered. In one example, an ad control is incorporated into an application or web page. When the ad control is to present an ad, the ad control requests an ad from an ad provider. Ads that are provided to the ad control have previously been submitted for certification, and have received a certificate. When the ad control receives the ad, it verifies the certificate using a digital signature. If the certificate verifies, then the ad is deemed acceptable to render, and the ad control renders the ad. Otherwise, the ad is not deemed acceptable to render, and the ad control requests another ad from the ad provider. | 06-26-2014 |
20140372231 | ONLINE SELLING MECHANISM CREATION - Online selling mechanism creation is described, for example, whereby a retailer with business goals and constraints benefits from automatic generation and execution of software which controls generation of online offers so as to meet the business goals within the constraints. For example, as business goals and constraints change over time, bespoke selling mechanisms may be automatically updated. In various examples business goals are used to select selling mechanisms from a plurality of available online selling mechanisms; properties of the selling mechanisms may be taken into account. In examples, generic software implementing the selling mechanisms is used to instantiate a bespoke selling mechanism according to particular business goals and constraints. For example, a bespoke selling mechanism may be executed at a commerce server so as to control dynamic generation of offers. | 12-18-2014 |
Patent application number | Description | Published |
20100054261 | SELECTIVE SESSION INTERCEPTION METHOD - A method for intercepting data of a network session passing between a first node and a second node on a data network, comprising the steps of: (i) providing an interceptor on a third node of the network; (ii) monitoring data passing between the first node and the second node; (iii) synchronizing the network data between the interceptor and the first and second nodes; (iv) creating a first socket on the interceptor for communicating with the first node and a second socket on the interceptor for communicating with the second node, and (v) intercepting the data so that data flowing between first and second nodes passes through the interceptor. | 03-04-2010 |
20100281051 | Bidirectional Data Transfer Optimization And Content Control For Networks - A method of transferring data objects over a network comprises intercepting a network transfer message with a passing object, creating a unique identifier for the object using a predetermined function, the same function having been used to provide identifiers for objects stored at predetermined nodes of said network, removing the object and sending on the network transfer message with the unique identifier in place of the object. Then, at the recipient end it is possible to obtain the unique identifier and use it as a key to search for a corresponding object in the local nodes. The search starts with a node closest to the recipient and steadily spreads outwards. The object when found is reattached for the benefit of the recipient and network bandwidth has been saved by the avoidance of redundant transfer since the object is brought to the recipient from the node which is the closest to him. | 11-04-2010 |
20120166586 | BIDIRECTIONAL DATA TRANSFER OPTIMIZATION AND CONTENT CONTROL FOR NETWORKS - A method of transferring data objects over a network comprises intercepting a network transfer message with a passing object, creating a unique identifier for the object using a predetermined function, the same function having been used to provide identifiers for objects stored at network nodes, removing the object and sending on the network transfer message with the unique identifier in place of the object. Then, at the recipient end it is possible to obtain the unique identifier and use it as a key to search for a corresponding object in the local nodes. The search starts with a node closest to the recipient and steadily spreads outwards. The object when found is reattached for the benefit of the recipient and network bandwidth has been saved by the avoidance of redundant transfer since the object is brought to the recipient from the node which is the closest to him. | 06-28-2012 |
Patent application number | Description | Published |
20090292649 | DEVICE, SYSTEM AND METHOD OF AUTOMATIC FINANCIAL-INSTRUMENT MANAGEMENT - Devices, systems, and methods of automatic Financial-Instrument (FI) management. In some embodiments, a system includes, a memory having stored thereon financial-instrument-based (FI-based) management instructions; and a processor to execute the FI-based management instructions resulting in a FI-based management application, wherein the FI-based management application may receive portfolio data corresponding to a plurality of financial-instrument portfolios associated with a plurality of clients, wherein the FI-based management application may automatically identify one or more portfolios of the plurality of portfolios satisfying at least one criterion, wherein, for each identified portfolio, the FI-based management application may receive client-specific management data corresponding to a client associated with the identified portfolio, wherein the client-specific management data includes at least client-specific destination information defining at least one destination, and wherein, for each identified portfolio, the FI-based management application may automatically communicate portfolio-related data corresponding to the identified portfolio to the destination defined by the management data. | 11-26-2009 |
20100005001 | SYSTEMS AND METHODS FOR ADVERTISING - A system for generating an advertisement to be displayed to a website visitor of a webpage, the system including: (a) product selection processing module, configured to select a product to be advertised; (b) an input interface for receiving real time information pertaining to the product; and (c) an advertisement generator, configured to generate the advertisement in response to the real time information and to provide the advertisement for displaying on the webpage. | 01-07-2010 |
20120041895 | DEVICE, SYSTEM, AND METHOD OF AUTOMATIC FINANCIAL-INSTRUMENT MANAGEMENT - Devices, systems, and methods of automatic Financial-Instrument (FI) management. In some embodiments, a system includes, a memory having stored thereon financial-instrument-based (FI-based) management instructions; and a processor to execute the FI-based management instructions resulting in a FI-based management application, wherein the FI-based management application may receive portfolio data corresponding to a plurality of financial-instrument portfolios associated with a plurality of clients, wherein the FI-based management application may automatically identify one or more portfolios of the plurality of portfolios satisfying at least one criterion, wherein, for each identified portfolio, the FI-based management application may receive client-specific management data corresponding to a client associated with the identified portfolio, wherein the client-specific management data includes at least client-specific destination information defining at least one destination, and wherein, for each identified portfolio, the FI-based management application may automatically communicate portfolio-related data corresponding to the identified portfolio to the destination defined by the management data. | 02-16-2012 |
20130282622 | DEVICE, SYSTEM, AND METHOD OF AUTOMATIC FINANCIAL-INSTRUMENT MANAGEMENT - Devices, systems, and methods of automatic Financial-Instrument (FI) management. In some embodiments, a system includes, a memory having stored thereon financial-instrument-based (FI-based) management instructions; and a processor to execute the FI-based management instructions resulting in a FI-based management application, wherein the FI-based management application may receive portfolio data corresponding to a plurality of financial-instrument portfolios associated with a plurality of clients, wherein the FI-based management application may automatically identify one or more portfolios of the plurality of portfolios satisfying at least one criterion, wherein, for each identified portfolio, the FI-based management application may receive client-specific management data corresponding to a client associated with the identified portfolio, wherein the client-specific management data includes at least client-specific destination information defining at least one destination, and wherein, for each identified portfolio, the FI-based management application may automatically communicate portfolio-related data corresponding to the identified portfolio to the destination defined by the management data. | 10-24-2013 |