$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Dual blind method and system for attributing activity to a user 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-015/16
  • G06F-021/62
출원번호 US-0366489 (2012-02-06)
등록번호 US-9037637 (2015-05-19)
발명자 / 주소
  • Jaye, Daniel
  • Secretan, James Q.
출원인 / 주소
  • J.D. Power and Associates
대리인 / 주소
    Rothwell, Figg, Ernst & Manbeck PC
인용정보 피인용 횟수 : 2  인용 특허 : 236

초록

A method and system for attributing activity to a user includes sharing information with an analytics server while attributes and a user profile cannot be tracked back to the original user from the analytics server. A temporary ID included in the shared information is destroyed, thus eliminating any

대표청구항

1. A computer-implemented method for attributing activity to a user, comprising the steps of: sending from a first content provider in response to a first request for content from a user browser executing on a user device, requested content and a first identification (ID) to the user browser, the fi

이 특허에 인용된 특허 (236)

  1. Mund, Matthew, Apparatuses, methods and systems for advancement path candidate cloning.
  2. Blake, Timothy W., Apparatuses, methods and systems for an inflation-sensitive index and associated financial product generator.
  3. Fitzpatrick, Dudley; Snyder, Jason Alan, Apparatuses, methods and systems for information querying and serving on the internet based on profiles.
  4. King, Martin T.; Grover, Dale L.; Kushler, Clifford A.; Stafford-Fraser, James Q., Applying scanned information to identify content.
  5. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
  6. Carter, Samuel Jeff; Garcia, Ray; Joa, David; Joffe, David; Mertz, John; Obradovic, Zoran; Schumacher, Hans, Authentication methods for use in financial transactions and information banking.
  7. Cohen, Peter D.; Ortega, Ruben E.; Cabrera, Luis Felipe, Automatically generating task recommendations for human task performers.
  8. Vysogorets, Mikhail; Shablygin, Eugene, Centralized authentication system with safe private data storage and method.
  9. Singh, Man Jit; Cancel, David, Clickstream analysis methods and systems related to modifying an offline promotion for a consumer good.
  10. Shein, Barak; Karmon, Kfir; Yariv, Eran; Varshavsky, Roy, Client-centered usage classification.
  11. Yeager,William J.; Chen,Rita Y.; Soto,Juan C., Collaborative content coherence using mobile agents in peer-to-peer networks.
  12. DeFerranti,Marcus; Elliot,Richard John; Panter,Nigel; Panter,Timothy, Communication system and method for connecting to multiple ISP's.
  13. Spalka, Adrian; Lenhardt, Jan, Computer implemented method for authenticating a user.
  14. Spalka, Adrian; Lenhardt, Jan, Computer implemented method for generating a pseudonym, computer readable storage medium and computer system.
  15. Spalka, Adrian; Lehnhardt, Jan; Gotthardt, Frank, Computer implemented method for performing cloud computing on data being stored pseudonymously in a database.
  16. York,Jeremy C.; Cottrell,Robert; Smith,Brent, Computer processes and systems for adaptively controlling the display of items.
  17. York, Jeremy C.; Cottrell, Robert; Smith, Brent, Computer processes for adaptively selecting and/or ranking items for display in particular contexts.
  18. Spalka, Adrian; Lehnhardt, Jan, Computer readable storage medium for generating a pseudonym, computer implemented method and computing device.
  19. Spalka, Adrian; Lehnhardt, Jan, Computer readable storage medium for generating an access key, computer implemented method and computing device.
  20. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  21. Drummond Shattuck Reed ; Peter Earnshaw Heymann ; Steven Mark Mushero ; Kevin Benard Jones ; Jeffrey Todd Oberlander ; Dan Banay, Computer-based communication system and method using metadata defining a control-structure.
  22. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  23. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  24. Dickinson, Alexander G.; Berger, Brian; Dobson, Jr., Robert T., Context sensitive dynamic authentication in a cryptographic system.
  25. Dickinson,Alexander G.; Berger,Brian; Dobson, Jr.,Robert T., Context sensitive dynamic authentication in a cryptographic system.
  26. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  27. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  28. Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
  29. Herz,Frederick S. M., Customized electronic newspapers and advertisements.
  30. DeLuccia, James, Data comparison system.
  31. Redlich, Ron M.; Nemzow, Martin A., Data security system and method adjunct to a browser, telecom or encryption program.
  32. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  33. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  34. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  35. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for separation of user communities.
  36. Redlich,Ron M.; Nemzow,Martin A., Data security system and method responsive to electronic attacks.
  37. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with adaptive filter.
  38. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  39. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  40. Redlich,Ron M.; Nemzow,Martin A., Data security system and method with parsing and dispersion techniques.
  41. Richard, Matthew; McDougal, Monty D., Detecting malware using patterns.
  42. Dixon, Christopher John; Pinckney, Thomas, Determining website reputations using automatic testing.
  43. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  44. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  45. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  46. Yared, Peter; Ellison, Gary; Hapner, Mark; Abrahams, Larry; Finkelstein, Sheldon J.; Stern, Hal; Beatty, John D.; Ranganathan, Aravindan; Allavarpu, Sai, Distributed network identity.
  47. Evenhaim, Asaf, Double blinded privacy-safe distributed data mining protocol.
  48. Symons, Matthew; Fender, Miles; Bose, Piu, Dynamic geo-location parameter for determining an impact of online behavior on offline sales.
  49. de Fabrega, Ingrid Perscky, E-commerce development intranet portal.
  50. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  51. Vaidyanathan, Lalitha; Quinn, John; Khaishgi, Ahmed; Cherry, Cara, Electronic dispute resolution system.
  52. Mattathil,George P., Email sender verification system.
  53. Burke, Michael George; Peshansky, Igor; Pistoia, Marco; Tripp, Omer, Enforcement of data privacy to maintain obfuscation of certain data.
  54. Mallean, Sean H.; Mallean, Henry G.; Gilder, Clark S., Enhanced customer interaction channel systems and methods.
  55. Moore, James F., Enhanced syndication.
  56. Gabriel, James Andrew; Anderson, John William, Extensible object-modelling mechanism.
  57. Sullivan, Scott L.; Leason, David, Game or lottery with a reward validated and/or redeemed online.
  58. Hoffberg, Steven M., Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference.
  59. Jain, Kamal, Generalized web-service.
  60. King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Identifying a document by performing spectral analysis on the contents of the document.
  61. Doughty, Dennis L.; Gordan, Benjamin M.; Mysore, Shrikanth B.; Tengler, Matthew A., Identifying a same user of multiple communication devices based on user routes.
  62. Dixon, Christopher John; Pinckney, Thomas, Indicating Website reputations during Website manipulation of user information.
  63. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations based on website handling of personal information.
  64. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during an electronic commerce transaction.
  65. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  66. Dixon, Christopher John; Pinckney, Thomas, Indicating website reputations during website manipulation of user information.
  67. Carter, Samuel Jeff; Garcia, Ray; Joa, David; Joffe, David; Mertz, John; Obradovic, Zoran; Schumacher, Hans, Information banking.
  68. Felsher, David Paul, Information record infrastructure, system and method.
  69. Felsher, David Paul, Information record infrastructure, system and method.
  70. Felsher, David Paul, Information record infrastructure, system and method.
  71. Felsher, David Paul, Information record infrastructure, system and method.
  72. Felsher, David Paul, Information record infrastructure, system and method.
  73. Regan, Timothy, Instant messaging for multi-user computers.
  74. Vaidyanathan, Lalitha; Quinn, John; Khaishgi, Ahmed; Cherry, Cara, Integrated electronic marketplace and online dispute resolution system.
  75. Kam,Kendrick W.; Horn,Bruce L., Internet-based system for identification, measurement and ranking of investment portfolio management, and operation of a fund supermarket, including "best investor" managed funds.
  76. Grasso Charles A. ; Schwartz Richard Lee, Intranet-based system with methods for co-active delivery of information to multiple users.
  77. Zijst, Erik Van, Layered multicast and fair bandwidth allocation and packet prioritization.
  78. Robinson, Jack D.; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Linking users into live social networking interactions based on the users' actions relative to similar content.
  79. Robinson, Jack D.; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Linking users into live social networking interactions based on the users' actions relative to similar content.
  80. Sayed, Hazem I, Location based asynchronous thread communications.
  81. Yeager,William J.; Chen,Rita Y., Managing distribution of content using mobile agents in peer-topeer networks.
  82. Kay, Alan F.; Henderson, Hazel; Pyne, Charles, Marketplace system fees enhancing market share and participation.
  83. Alexander, Justin; Schweitzer, Rob; Morganstein, David S.; Buchheit, Brian K., Media advertising over peer-to-peer networks.
  84. Trevor Blumenau, Metering of internet content using a control.
  85. Arent Michael A., Method and apparatus for authenticating on-line transaction data.
  86. Nordman,Ian; Alam��ki,Tero; V��nsk��,Marko; Tarkiainen,Mikko; Gyorb��r��,Norbert; Gripenberg,Casper, Method and apparatus for managing and enforcing user privacy.
  87. Todd, John; Sivanesan, Sai; Cann, David, Method and apparatus for regulating data flow between a communications device and a network.
  88. Hugh,Harlan M., Method and apparatus for sharing many thought databases among many clients.
  89. Sarcanin, Branko, Method and system for a virtual safe.
  90. Scofield, Christopher L.; Pope, Elmore Eugene; Marshall, Brad E., Method and system for associating search keywords with interest spaces.
  91. Estrada,Julio, Method and system for creating a place type to be used as a template for other places.
  92. Estrada,Julio; Estrada,Miguel A.; Hill,Charles Robert; Shalabi,Sami Mohammed; Shore,Maurice B., Method and system for designing a theme and associating it with a collaboration space user interface.
  93. Scofield, Christopher L.; Pope, Elmore Eugene; Marshall, Brad E.; Merritt, Eric B., Method and system for displaying interest space user communities.
  94. Toffey, James Worden, Method and system for effecting straight-through-processing of trades of various financial instruments.
  95. Scofield, Christopher L.; Pope, Elmore Eugene; Marshall, Brad E., Method and system for occurrence frequency-based scaling of navigation path weights among online content sources.
  96. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for online document collaboration.
  97. Linsey,Terry June; Hill,Charles Robert, Method and system for providing a separate browser window with information from the main window in a simpler format.
  98. Banatwala,Mustansir, Method and system for providing synchronous communication and person awareness in a place.
  99. Bender, Brad H.; Cronin, Garrett J.; Lloyd, John A., Method and system for sharing anonymous user information.
  100. McAlindon,Timothy E.; Kabbara,Karim A. N., Method for conducting clinical trials over the internet.
  101. Thompson, Cameron; Pellet, Ryan; Jaspal, Devi, Method for prioritizing and presenting recommendations regarding organizaion's customer care capabilities.
  102. Nye, Timothy G., Method for providing an attribute bounded network of computers.
  103. Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Fullerton, Larry, Method of inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content.
  104. Lee, Haengju; Gnanasambandam, Shanmuga-nathan; Sun, Yu-An, Method of providing targeted communications to a user of a printing system.
  105. Bollen, Johan; Van De Sompel, Herbert, Method of recommending items to a user based on user interest.
  106. Di Giusto, Sandro; Montessoro, Pier Luca; Pierattoni, Davide, Method to search for affinities between subjects and relative apparatus.
  107. Hoerenz, Chris P., Method, system and apparatus for targeting an offer.
  108. Hamilton, II, Rick A.; Huie, William J.; Li, Jenny S.; Pickover, Clifford A., Method, system and program product for distribution of feedback among customers in real-time.
  109. Fisher, Douglas, Method, system and service for conducting authenticated business transactions.
  110. Russek, David J., Method, system and software for digital media narrative personalization.
  111. von Kaenel,Tim A.; Dyrnaes,David Neil; Kumar,C. Suresh; Wayman,Jared Paul; Goodwin,Jonathan David; Trivelpiece,Craig Evan; Mihalich,Joseph; Jenkins,Anthony Page; Odom, Jr.,Richard Hoyt; Stier,Mark An, Method, system, and program for an improved enterprise spatial system.
  112. Rouse, Phillip C.; Blake, Victoria; Horen, Jeff; Culp, Amanda, Methods and systems for optimizing escheat and derecognition of prepaid cards, stored value cards, credit memos and electronic payment instruments.
  113. Karantzis, Nickolas John, Methods and systems for verifying transactions.
  114. May, R. Raymond, Methods for risk portfolio management within an electronic trading system.
  115. Yeager, William J.; Chen, Rita Y., Mobile agents in peer-to-peer networks.
  116. Ansari, Amir; Cowgill, George A.; Masina, Ramprakash; Ramayya, Jude P.; McQuarters, Alvin R.; Raissyan, Atousa; Nicholls, Leon E., Multi-services application gateway and system employing the same.
  117. Bunker, V,Nelson Waldo; Laizerovich,David; Bunker,Eva Elizabeth; Van Schuyver,Joey Don, Network security testing.
  118. Neff, Sam; Galang, Raymond; Parasuraman, Sundararajan, Network-accessible collaborative annotation tool.
  119. Ewing, Carrel W.; Cleveland, Andrew J.; Auclair, Brian P., Network-connected power manager for rebooting remote computer-based appliances.
  120. Ewing,Carrel W.; Cleveland,Andrew J.; Auclair,Brian P., Network-connecting power manager for remote appliances.
  121. Reed, Drummond Shattuck, Object-based on-line transaction infrastructure.
  122. Patel, Dorab; Kalter, Scott D.; Eliahou, Uzi, Online media exchange.
  123. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  124. Yeager,William J.; Chen,Rita Y., Peer trust evaluation using mobile agents in peer-to-peer networks.
  125. Pollard, Stephen M., Personal data manager systems and methods.
  126. Pollard, Stephen M., Personal data subscriber systems and methods.
  127. Ananian,John Allen, Personalized interactive digital catalog profiling.
  128. Micali, Silvio; Engberg, David; Libin, Phil; Reyzin, Leo; Sinelnikov, Alex, Physical access control.
  129. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  130. Ananian, John Allen, Pre-screening system and method.
  131. Yeager, William J.; Chen, Rita Y., Presence detection using mobile agents in peer-to-peer networks.
  132. Leason, David; Sullivan, Scott L., Promotional campaign award validation methods through a distributed computer network.
  133. Leason, David; Sullivan, Scott L., Promotional campaign award validation methods through a distributed computer network.
  134. Leason, David; Sullivan, Scott L., Promotional campaign award validation methods through a distributed computer network.
  135. Marcucci, Justin; Randquist, Coby P., Providing an answer to a question from a social network site using a separate messaging site.
  136. Herz, Frederick S. M., Providing customized electronic information.
  137. Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
  138. Baker, Steven D.; Flaster, Michael; Gupta, Nitin; Haahr, Paul; Venkatachary, Srinivasan; Wu, Yonghui, Query generation using structural similarity between documents.
  139. Raduchel, William J., Records access and management.
  140. Shkedi, Roy, Requesting offline profile data for online use in a privacy-sensitive manner.
  141. Shkedi, Roy, Requesting offline profile data for online use in a privacy-sensitive manner.
  142. Shkedi, Roy, Requesting offline profile data for online use in a privacy-sensitive manner.
  143. Xu, Yongyong, Resource based virtual communities.
  144. Xu, Yongyong, Resource based virtual communities.
  145. Marcucci, Justin; Randquist, Coby P, Searching data in a social network to provide an answer to an information request.
  146. Ludtke,Harold Aaron; Candelore,Brant L., Secure and convenient method and apparatus for storing and transmitting telephony-based data.
  147. Hilaiel, Lloyd T.; Grigsby, David B.; Durand, Gordon; Spencer, Steven E., Secure browser-based applications.
  148. Herz, Frederick S. M.; Labys, Walter Paul; Parkes, David C.; Kannan, Sampath; Eisner, Jason M., Secure data interchange.
  149. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  150. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  151. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  152. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  153. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  154. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  155. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  156. Partovi, Shahram; Bird, C. Roger, Secure digital couriering system and method.
  157. Meketa, Deneb, Secure operation of transitory computer applications.
  158. Meketa, Deneb, Secure operation of transitory computer applications.
  159. Redlich, Ron M.; Nemzow, Martin A., Security system with extraction, reconstruction and secure recovery and storage of data.
  160. Bayram, Sevinc; Sencar, Husrev Taha; Memon, Nasir, Sensor fingerprint matching in large image and video databases.
  161. Dickinson,Alexander G.; Davenport,Roger S.; Ohare,Mark S.; Clough,Philip W.; Rohrbach,Mark D.; Clayton,Richard F.; Zoccoli,James G.; Stark,Gregory H.; Orsini,Rick L.; Ferrante,Michelle; Brooks,Aaron , Server-side implementation of a cryptographic system.
  162. Rapaport, Jeffrey A.; Rapaport, Seymour; Smith, Kenneth Allen; Beattie, James; Gimlan, Gideon, Social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic.
  163. Rapaport, Jeffrey Alan; Rapaport, Seymour; Smith, Kenneth Allen; Beattie, James; Gimlan, Gideon, Social-topical adaptive networking (STAN) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging.
  164. May, R. Raymond, Switch engine for risk position discovery in an electronic trading system.
  165. Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Lu, Jeannie J., System and method for a web based trust model governing delivery of services and programs.
  166. Williams, Jason S., System and method for an anonymous exchange of private data.
  167. Iannacci,Gregory Fx, System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling.
  168. Mascarenhas,Desmond, System and method for anonymous transaction in a data network and classification of individuals without knowing their real identity.
  169. De Monseignat, Bernard; Moreau, Stéphane, System and method for authentication, data transfer, and protection against phishing.
  170. Abreu, Marcio Marc, System and method for communicating product recall information, product warnings or other product-related information to users of products.
  171. Betsch, Regis J.; Bushnell, Stephen P.; Hathi, Manoj S., System and method for controlling access to information stored at plurality of sites.
  172. Schneiderman, Jamie; Baldwin, Ben, System and method for creating a dynamic customized employment profile and subsequent use thereof.
  173. Kraenzel,Carl J.; Immerman,John D.; Mills,William A.; Lu,Jeannie J., System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform.
  174. Berthold,Suze; Immerman,John D.; Kaufman,Charles W.; Kraenzel,Carl J., System and method for downloading security context elements governing execution of downloadable and distributable agents.
  175. Melamed, David P.; Nejat, Morris, System and method for facilitating generation and performance of on-line evaluations.
  176. Maritzen, L. Michael; Ludtke, Harold Aaron, System and method for facilitating real time transactions between a user and multiple entities.
  177. Ovide, Christopher Brian, System and method for identifying romantically compatible subjects.
  178. Haddad, Sylvie Feghali, System and method for implementing privacy preferences and rules within an e-business data warehouse.
  179. Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Nowacki, Mark A.; Lu, Jeannie J., System and method for managing concurrent scheduled or on-demand replication of subscriptions.
  180. Gaddala, Satish Kumar, System and method for monitoring social engineering in a computer network environment.
  181. Papamanthou, Charalampos; Tamassia, Roberto; Triandopoulos, Nikolaos, System and method for optimal verification of operations on dynamic sets.
  182. Kraenzel, Carl J.; Immerman, John D.; Mills, William A., System and method for providing a distributable runtime.
  183. Immerman, John D.; Kraenzel, Carl J.; Mills, William A., System and method for providing a distributable runtime that deploys web applications and services from a workflow, enterprise, and mail-enabled web application server and platform.
  184. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  185. Frederick S. M. Herz, System and method for providing customized electronic newspapers and target advertisements.
  186. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing multimedia services.
  187. Rosenberg, Jonathan D.; Andreasen, Flemming S., System and method for providing telephony services.
  188. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  189. Immerman, John D.; Nowacki, Mark A.; Kraenzel, Carl J., System and method for selective replication of databases within a workflow, enterprise, and mail-enabled web application server and platform.
  190. Rice, III,James L., System and method of permissive data flow and application transfer.
  191. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  192. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
  193. Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
  194. Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Fullerton, Larry, System for inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content.
  195. Kramer, James F.; Ning, Paul C., System for providing a service to venues where people aggregate.
  196. Kramer, James Frederick, System for providing a service to venues where people aggregate.
  197. Stefanchik, Michael F.; Mathe, John G.; Scott, Robin L.; Loper, Steven W.; Krueger, Christopher S.; Groves, Robert H., System for the creation of database and structured information from verbal input.
  198. Wittke, Edward R.; Wittke, Mellissa A.; Mazur, Connie S.; Mazur, Kenneth A., System for timely delivery of personalized aggregations of, including currently-generated, knowledge.
  199. Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
  200. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving automobile sales.
  201. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving determining related or complementary items.
  202. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving forecasting demand.
  203. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving matching a distribution list.
  204. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving matching a sales medium.
  205. Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving product pricing.
  206. Shkedi, Roy; Shlomo, Ronen, Systems and methods for dealing with online activity based on delivery of a television advertisement.
  207. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  208. O'Brien, Richard J.; Gallant, Andrew M., Systems and methods for managing permissions for information ownership in the cloud.
  209. Stack, Brian; Lientz, Andrew; Chamberlain, Simon; Abdous, Yacine; Kahn, Ray, Systems and methods for providing anonymized user profile data.
  210. Orsini, Rick L.; O'Hare, Mark S.; Staker, Matt, Systems and methods for secure multi-tenant data storage.
  211. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data.
  212. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  213. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  214. Shkedi, Roy, Systems and methods for taking action with respect to one network-connected device based on activity on another device connected to the same network.
  215. Oakes, III, Charles Lee; Burks, Rickey Dale; Morlen, Randy Ray, Systems and methods for virtual banking.
  216. Deborah Sterling CA, Systems and methods for virtual population mutual relationship management using electronic computer driven networks.
  217. Maxwell, Duane Stewart; Huang, Andrew S.; Steele, Kenneth Earl; Tomlin, Stephen L.; Adler, Steven Michael, Systems and methods for widget rendering and sharing on a personal electronic device.
  218. Manroa, Arun; Choksi, Ojas, Systems and methods of group distribution for latency sensitive applications.
  219. Yoo, David, Systems and methods to provide search based on social graphs and affinity groups.
  220. May,R. Raymond, Systems for switch auctions utilizing risk position portfolios of a plurality of traders.
  221. Jones, William J.; Mennie, Douglas U.; Blake, John R.; Hallowell, Curtis W., Systems, apparatus, and methods for currency processing control and redemption.
  222. R. Raymond May, Systems, methods and computer program products for electronic trading of financial instruments.
  223. May R. Raymond, Systems, methods and computer program products for monitoring credit risks in electronic trading systems.
  224. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  225. Moskowitz,Scott A., Systems, methods and devices for trusted transactions.
  226. Manroa, Arun; Choksi, Ojas, Talk group management architecture.
  227. Alexander, Justin; Schweitzer, Rob; Morganstein, David S.; Buchheit, Brian K., Targeted media advertising over networks.
  228. Shkedi, Roy; Shlomo, Ronen, Targeted online advertisements based on viewing or interacting with television advertisements.
  229. Shkedi, Roy, Targeted television advertisements based on online behavior.
  230. Shkedi, Roy, Targeted television advertisements based on online behavior.
  231. Shkedi, Roy; Ben-Yishai, Dror, Targeted television advertising based on profiles linked to multiple online devices.
  232. Guarraci, Brian J.; White, Christopher C.; Ferguson, Niels Thomas; Jones, Jeffrey Dick; Nolan, Sean Patrick; Apacible, Johnson T.; Varadan, Vijay, Unified authentication for web method platforms.
  233. Adler, Steven B.; Brown, Nigel Howard Julian; Gilbert, Arthur M.; Palmer, Charles Campbell; Schnyder, Michael; Waidner, Michael, Using a privacy agreement framework to improve handling of personally identifiable information.
  234. Adler,Steven B.; Bangerter,Endre Felix; Brown,Nigel Howard Julian; Camenisch,Jan; Gilbert,Arthur M.; Karjoth,Guenter; Kesdogan,Dogan; McCullough,Michael Robert; Nelson,Adam Charles; Palmer,Charles Ca, Using a rules model to improve handling of personally identifiable information.
  235. Adler, Steven B.; Bangerter, Endre Felix; Bohrer, Kathryn Ann; Brown, Nigel Howard Julian; Camenisch, Jan; Gilbert, Arthur M.; Kesdogan, Dogan; Leonard, Matthew P.; Liu, Xuan; McCullough, Michael Robert; Nelson, Adam Charles; Palmer, Charles Campbell; Powers, Calvin Stacy; Schnyder, Michael; Schonberg, Edith; Schunter, Matthias; Van Herreweghen, Elsie; Waidner, Michael, Using an object model to improve handling of personally identifiable information.
  236. Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Using internet content as a means to establish live social networks by linking internet users to each other who are simultaneously engaged in the same and/or similar content.

이 특허를 인용한 특허 (2)

  1. Bryson, Donald L.; Kline, Eric V.; Rakshit, Sarbajit K., Providing temporary contact information.
  2. Bryson, Donald L.; Kline, Eric V.; Rakshit, Sarbajit K., Providing temporary contact information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로