AOL LLC Patent applications |
Patent application number | Title | Published |
20120201237 | GENERATING MULTIPLE DATA STREAMS FROM A SINGLE DATA SOURCE - A switch having a first communications interface to receive a stream of data units, a buffer to store the payload portion of the data unit, a replicator to duplicate at least the payload portion of the data unit, and a second communications interface to enable access to the stream of data units by two or more terminals. | 08-09-2012 |
20120110104 | MESSAGE SCREENING SYSTEM - A message screening system includes routing to a supervisory recipient an electronic message directed to an intended recipient. The supervisory recipient then is allowed to screen the electronic message by approving or rejecting the electronic message. The electronic message then is forwarded to the intended recipient if the electronic message is approved by the supervisory recipient. | 05-03-2012 |
20120096100 | AUTHENTICATION OF ELECTRONIC DATA - Systems and techniques for transmitting electronic data by receiving, at a communications system host, electronic data transmitted from a sender and addressed to an intended recipient; authenticating the electronic data based on attributes of the electronic data and appending information to the electronic data indicating that the electronic data has been authenticated. | 04-19-2012 |
20100198969 | Deep Packet Scan Hacker Identification - Securing an accessible computer system typically includes receiving a data packet that includes a payload portion and an attribute portion, where the data packet is communicated between at least one access requestor and at least one access provider. At least the payload portion of the received data packet typically is monitored, where monitoring includes scanning the payload portion for at least one predetermined pattern. When the payload portion is determined to include at least one predetermined pattern, access by the access requestor to the access provider may be controlled . Monitoring the data packet may include scanning the payload portion while handling the data packet with a switch. Controlling access may include denying access by the access requestor to the access provider. | 08-05-2010 |
20100169801 | MULTIPLE AVATAR PERSONALITIES - Perception of multiple online personas is enabled in an instant messaging communications session. At least two identities within a communications environment to whom messages may be directed are identified. A first persona of a user is enabled to be projected to a first of the identities while a second persona of the same user is enabled to be concurrently projected to a second of the identities. The first and second personas each include an avatar capable of being animated, and the first persona and the second persona differ. | 07-01-2010 |
20100138658 | Electronic Message System with Federation of Trusted Senders - Systems and methods for allowing challenge messages to be sent directly to a recipient's inbox where normally the challenge message would be sent to a pending folder or deleted. Challenge messages sent between federated messaging services contain a federated token which can be identified, authenticated and validated to determine whether the challenge message should be sent to a recipient's inbox. The federated token can include an authentication portion and a validation portion. Authentication methods for the authentication portion can include, for example, checksums, salts, hashes and digital signatures. Once a federated token is authenticated by decrypting the authentication portion according to one or more of these authentication methods, the federated token is validated by determining the defined use-base and determining whether the receipt of the federated token satisfies the defined use. | 06-03-2010 |
20100138512 | SELF-POLICING, RATE LIMITING ONLINE FORUMS - A method and means for self-policing and automatically rate-limiting multiple-user online forums. The preferred embodiment of the invention includes a set of rules that permit users to censure other users. A censured user has one or more “privileges” (which may include access to the online computer system or the effective message rate of a communications connection) taken away or diminished; the privilege is gradually restored if the censured user behaves. The censuring participant and other pertinent participants are notified of the effect of the censuring on the censured user. In another aspect of the invention, the online computer system automatically tracks the rate at which a user sends certain types of messages, and can message rate limit a user who uses too many system resources by sending a large number of messages in rapid succession. | 06-03-2010 |
20100138444 | FEDERATED CHALLENGE CREDIT SYSTEM - Systems and methods for reducing the number of challenge messages that are sent in response to an incoming message in situations where the incoming message is likely not unsolicited. The systems and methods include evaluating the behavior of a sender with regard to one or more federated messaging services and determining if the sender is approved or unapproved. If the sender is approved, the incoming message is deliver to a recipient's inbox without issuing a challenge message. Unapproved senders are required to respond to a challenge message. | 06-03-2010 |
20100114882 | CULTURALLY RELEVANT SEARCH RESULTS - Search results may be provided to a user. A search query may be received from the user. A query feature vector may be formed for the search query. The query feature vector may be compared with news feature vectors associated with documents related to current events. An augmented query feature vector may be formed based on results of the comparison of the query feature vector with the news feature vectors. The augmented query feature vector may be compared with feature vectors related to target documents. Search results that include target documents may be identified based on results of the comparison of the augmented query feature vector with the feature vectors related to the target documents. The user may be made able to perceive at least some of the identified search results. | 05-06-2010 |
20100094942 | AUTHENTICATION OF ELECTRONIC DATA - Systems and techniques for transmitting electronic data by receiving, at a communications system host, electronic data transmitted from a sender and addressed to an intended recipient; authenticating the electronic data based on attributes of the electronic data and appending information to the electronic data indicating that the electronic data has been authenticated. | 04-15-2010 |
20100091985 | SYSTEM AND METHOD FOR USING A STREAMING PROTOCOL - An initialization vector (IV) is employed to decrypt a block of a stream that has been encrypted with Cypher Block Chaining (CBC) encryption, without requiring decryption of previous blocks within the stream. For example, a listener who accesses a distribution point to retrieve encrypted content authenticates himself to an application server that regulates access to encrypted content on the distribution point, and responsively receives a key. The listener then requests access to a reference point within the encrypted content stream somewhere after its beginning (e.g., using preview clips). The distribution point relates the reference point to a corresponding block of the encrypted stream, and identifies an IV previously used for encryption of that block. The distribution point provides the associated encrypted block of content and the IV to the listener to enable mid-stream rendering of the encrypted content, without requiring the listener to decrypt previous blocks within the encrypted stream. | 04-15-2010 |
20100088322 | REAL TIME QUERY TRENDS WITH MULTI-DOCUMENT SUMMARIZATION - A list of “hot topics” may be provided to a user to indicate information that is currently popular. A topic may be deemed popular when a large number of search queries related to the topic are entered by users. A search system may receive and analyze an electronic source of published information to determine a reason for why a particular popular topic is popular. If content related to why a particular popular topic is popular exists in multiple electronic sources of published information, text summarization techniques may be used to determine a reason for why the popular topic is popular by from among the multiple electronic sources of published information. | 04-08-2010 |
20100077049 | Reconfiguring an Electronic Message to Effect an Enhanced Notification - An electronic message may be reconfigured to effect an enhanced notification using an input interface to receive at least one electronic message created by or on behalf of a message source for delivery to an intended recipient. A matching engine determines whether the electronic message corresponds to a predetermined definition of an enhanced notification. An enhancement engine reconfigures the electronic message to the enhanced notification if stored information related to the intended recipient indicates that the intended recipient is subscribed to receive the enhanced notification. Reconfiguring the electronic message may include reconfiguring the message to provide special handling, routing or presentation. | 03-25-2010 |
20100071013 | IDENTIFYING EVENTS OF INTEREST WITHIN VIDEO CONTENT - Instant messages sent by a viewer of a video while the video is perceivable to the viewer may be monitored. An event of interest occurring in the video may be identified based on the monitored instant messages. Metadata that describes the event of interest may be generated and assigned to the video. A request for video content associated with the video may be received from a user. An indexed collection of videos that includes the video may be searched for the requested video content. Based on the search, it may be determined that the video satisfies the user's request. The event of interest occurring in the video may be identified based on the metadata assigned to the video. User perception of a scene from the video that includes the event of interest may be enabled. | 03-18-2010 |
20100036928 | Personalized Location Information for Mobile Devices - Providing location information on a mobile device includes receiving signals from external devices. Each signal includes information that specifies a geographic location for the external device that has provided the signal. A geographic location for the mobile device is calculated by using the information contained in each of the received signals. A representation of the geographic location of the mobile device is generated. The representation of the geographic location is included within an electronic message that provides information describing a user of the mobile device to other users of an electronic communications system. The electronic message is transmitted to another device to provide an indication of the geographic location for the user to one of the other users of the electronic communications system. | 02-11-2010 |
20100024013 | Authenticating a Client Using Linked Authentication Credentials - Techniques are provided for improving security in a single-sign-on context by providing, to a user's client system, two linked authentication credentials in separate logical communication sessions and requiring that both credentials be presented to a host system. Only after presentation of both credentials is the user authenticated and permitted to access applications on the host system. | 01-28-2010 |
20100017756 | MANAGING NAVIGATION AND HISTORY INFORMATION - History and navigation information in a computer application are managed by establishing a global context that can communicate with multiple resources, each of which resides in an associated local context. State information from one or more of the local contexts is communicated to the global context, and global navigation information (for example, defining a drop-down history list or back/forward button states) is generated based on the communicated state information. Using the global navigation information, a user of the computer application can move among previously visited resources in a global manner. | 01-21-2010 |
20100008263 | SYSTEMS AND METHODS FOR CONFIGURING SUBSCRIBER SYSTEMS IN WIRELESS MESH NETWORKS - A wireless network may be managed by identifying one or more wireless subscriber systems included in a lobe pool of a wireless network, identifying at least one candidate subscriber system outside of the lobe pool with which to enable communications, and reconfiguring the antenna such that the lobe pool includes the identified candidate subscriber system. | 01-14-2010 |
20090307326 | MANAGING ELECTRONIC MESSAGES - A recipient computer system may receive one or more electronic messages. The recipient computer system may send one, two, or more challenge messages to the sender of the electronic messages in determining whether to deliver the electronic message. The recipient computer system may accept or reject an electronic message based on the response, or lack of response, to the challenge messages. The recipient computer system may send two or more challenge messages at intervals. A sender computer system may record activity of the sender computer system for a recipient computer system to use in determining whether to deliver an electronic message. A sender computer system may provide a summary of that activity with an electronic message. A sender computer system may provide an authorization key for a recipient computer system to use in determining whether to deliver an electronic message. The authorization key may be generated by a third party. | 12-10-2009 |
20090292526 | MONITORING CONVERSATIONS TO IDENTIFY TOPICS OF INTEREST - A system and method for monitoring conversations of a community of users to identify topics of interest is provided. A user community which is based partly on social networking connections relative to a first user is identified. Conversations involving at least one member of the identified user community are monitored. Based in part on an aggregated analysis of the monitored conversations, keywords are selected to present to the first user. The first user is then provided with a display in which the selected keywords associated with the user community are presented to the first user such that the first user can select a keyword to access content associated therewith. | 11-26-2009 |
20090228564 | ELECTRONIC MAIL FORWARDING SERVICE - A system and method are disclosed that enable an email service provider to implement an email forwarding service without losing associated page views. In one embodiment, rather than forwarding the entire email message, the email forwarding service generates a summary email message, and sends this summary email message to the forwarding email address pre-specified by the subscriber. This summary email message includes a link that is selectable by the user to view the original email message on a web site of the email service provider. Thus, even if the forwarding email address is hosted externally, the subscriber still views the full email message on a web site of the provider of the email forwarding service. | 09-10-2009 |
20090222444 | QUERY DISAMBIGUATION - A search query is resolved prior to being submitted to one or more search engines. The query is resolved such that the query unambiguously corresponds to a category included in a query ontology that relates search queries to query categories. The query may be resolved by supplementing the query with additional information corresponding to the category. For example, the query may be formatted into a canonical form of the query for the category. Alternatively or additionally, the query may be supplemented with one or more keywords that are associated with the category and that represent words or phrases that appear in a high percentage of search results for queries from the category. Resolving the query yields search results that more closely reflect search results desired by a user submitting the query. | 09-03-2009 |
20090213001 | Dynamic Location of a Subordinate User - Providing location information to a supervisory user includes providing a parental control, using a computer automatically to determine a location of a subordinate user, and storing location information indicative of the location of the subordinate user in a database. A request of the supervisory user to locate the subordinate user is received and a user interface informs the supervisory user of the location of the subordinate user based on the stored location information. At least one of the storing and/or the informing are based on the parental control. | 08-27-2009 |
20090199271 | IMPLICIT POPULATION OF ACCESS CONTROL LISTS - Communication applications may include lists of users with which a user of the application communicates. If two users of a communications application each include the other user on their user lists, an implicit trust may be established between the users. For example, if user A includes user B in her list and user B includes user A in his list, then it may be determined that each user knows and/or trusts the other user. As a result, a connection or communications pathway may be automatically created between the client devices of the users to facilitate communications between the users based on the implicit trust. | 08-06-2009 |
20090177655 | CATEGORY SEARCHING - Performing a category search to identify categories of web sites that relate to a search term includes receiving at least one search term that then is compared with a hierarchy of category identifiers, and with terms related to one or more categories, to determine whether matches exist. A category identifier is selected based on the matches that are determined to exist within the hierarchy and the terms, and at least the category identifier is displayed. Performing a search to identify web sites and categories of web sites that relate to a search term also may include receiving at least one search term that then is compared with a list of recommended web sites, previously performed searches, a hierarchy of category identifiers, and terms related to one or more categories to determine whether matches exist. Results based on matches that are determined to exist are displayed. | 07-09-2009 |
20090172564 | Geographic Location Notification Based On Identity Linking - A user maintains notification setting information having temporal periods capable of controlling, at least in part, the dissemination of information describing the on-line presence of the user within an instant messaging system or the geographic location of one or more mobile communications devices used by the user. The user may use multiple identities to communicate within the instant messaging system and/or with the mobile communications device or devices. The user can maintain sets of temporal periods for each of the multiple identities. Only one identity may be used at a specific time to communicate to a specific other identity, but the multiple identities of the user may be linked such that on-line presence and/or geographic location associated with one of the identities is disseminated based on the temporal periods set for one or more of the multiple identities. | 07-02-2009 |
20090157843 | METHOD AND SYSTEM FOR MANAGING DIGITAL ASSETS - The claimed invention enables digital asset management that is responsive to a user's interactions with digital assets. Based on the user's interaction, the invention generates a ranking of the digital assets that is intended to reflect the value of the digital assets to the user. The ranking is based in part on the access frequency and recency, and the number and types of uses of the digital assets. An access hierarchy is derived from the ranking that stores the digital assets so that the higher ranked digital assets are more easily accessed than the lower ranked digital assets. The digital assets can include any of digital images, audio files, and Uniform Resource Locators. The invention can also distinguish between different types of uses so that some types of uses imbue an asset with greater value than others. The types of uses include passive viewing or playback, file sharing, transport, and editing. The invention also allows the user to assign subjective values to each digital asset that can be factored into the ranking independently of usage patterns. A volatility-dampening attribute is provided to moderate volatility in the access hierarchy. | 06-18-2009 |
20090144275 | SYSTEM AND METHOD FOR GENERAL SEARCH PARAMETERS HAVING QUANTIZED RELEVANCE VALUES THAT ARE ASSOCIATED WITH A USER - The system and method comprises enhancement of results for a search engine, wherein the results from the search engine are refined or reorganized, based upon information from an identified secondary source. The results obtained using a conventional search are compared against the identified secondary source, e.g. a ratings service, and are filtered and/or sorted appropriately. In some embodiments, identification of the secondary source, such as a ratings service comprising information which may supplement the subject of a search query, is based upon information entered by the user. In alternate embodiments, the secondary source is associated with a user, as part of general user-specified search parameters, wherein one or more parameters are consulted automatically for searches for appropriate subject matter. | 06-04-2009 |
20090138828 | ORDERING OF CONVERSATIONS BASED ON MONITORED RECIPIENT USER INTERACTION WITH CORRESPONDING ELECTRONIC MESSAGES - A system and computer-implemented method includes presenting a user interface having a visual representation for each of multiple ongoing conversations involving a recipient user identity who is associated with each of the conversations. Message activity of the recipient user identity with respect to one or more of the multiple ongoing conversations is monitored and activity level associated with at least one incoming message for a recipient user identity is identified based upon the monitored message activity. The monitored message activity includes the recipient user identity's interaction with a conversation associated with the incoming message. A relative hierarchy for the ongoing conversations is determined based on the activity level associated with the at least one incoming message, and the user interface is arranged such that a conversation associated with an incoming message having a relatively high activity level is positioned to reflect hierarchical prominence in comparison to another conversation associated with an incoming message having a relatively low activity level. | 05-28-2009 |
20090117893 | Systems and Methods for Configuring Subscriber Systems in Wireless Mesh Networks - A wireless network may be managed by identifying one or more wireless subscriber systems included in a lobe pool of a wireless network, identifying at least one candidate subscriber system outside of the lobe pool with which to enable communications, and reconfiguring the antenna such that the lobe pool includes the identified candidate subscriber system. | 05-07-2009 |
20090106416 | Shared Groups Rostering System - Information about all current members of a group is stored. Instructions are received from at least one current member to invite at least one prospective member to join the group and the invitation to join the group is sent to the prospective member. In the event that an affirmative response is received, the prospective member is added to the current members of the group and automatically updated services are provided to current members of the group. | 04-23-2009 |
20090063164 | METHOD AND SYSTEM FOR REDUCTION OF QUANTIZATION-INDUCED BLOCK-DISCONTINUITIES AND GENERAL PURPOSE AUDIO CODEC - A method and system for reduction of quantization-induced block-discontinuities arising from lossy compression and decompression of continuous signals, especially audio signals. One embodiment encompasses a general purpose, ultra-low latency, efficient audio codec algorithm. More particularly, the invention includes a method and apparatus for compression and decompression of audio signals using a novel boundary analysis and synthesis framework to substantially reduce quantization-induced frame or block discontinuity; a novel adaptive cosine packet transform (ACPT) as the transform of choice to effectively capture the input audio characteristics; a signal-residue classifier to separate the strong signal clusters from the noise and weak signal components (collectively called residue); an adaptive sparse vector quantization (ASVQ) algorithm for signal components; a stochastic noise model for the residue; and an associated rate control algorithm. The invention further includes corresponding computer program implementations of these and other algorithms. | 03-05-2009 |
20090034805 | Using Relevance Feedback In Face Recognition - Images are searched to locate faces that are the same as a query face. Images that include a face that is the same as the query face may be presented to a user as search result images. Images also may be sorted by the faces included in the images and presented to the user as sorted search result images. The user may provide explicit or implicit feedback regarding the search result images. Additional feedback may be inferred regarding the search result images based on the user-provided feedback, and the results may be updated based on the user-provided and inferred feedback. | 02-05-2009 |
20080320225 | SYSTEMS AND METHODS FOR CACHING AND SERVING DYNAMIC CONTENT - A web server and a shared caching server are described for serving dynamic content to users of at least two different types, where the different types of users receive different versions of the dynamic content. A version of the dynamic content includes a validation header, such as an ETag, that stores information indicative of the currency of the dynamic content and information indicative of a user type for which the version of the dynamic content is intended. In response to a user request for the dynamic content, the shared caching server sends a validation request to the web server with the validation header information. The web server determines, based on the user type of the requestor and/or on the currency of the cached dynamic content whether to instruct the shared caching server to send the cached content or to send updated content for serving to the user. | 12-25-2008 |
20080319995 | RELIABILITY OF DUPLICATE DOCUMENT DETECTION ALGORITHMS - In a single-signature duplicate document system, a secondary set of attributes is used in addition to a primary set of attributes so as to improve the precision of the system. When the projection of a document onto the primary set of attributes is below a threshold, then a secondary set of attributes is used to supplement the primary lexicon so that the projection is above the threshold. | 12-25-2008 |
20080306913 | DYNAMIC AGGREGATION AND DISPLAY OF CONTEXTUALLY RELEVANT CONTENT - A web-based system scans content for specific terms, and transforms occurrences of the terms into hypertext links. Each hypertext link provides access to a dynamically generated web page which contains aggregated content related to the respective term. The aggregated content may be gathered through a distributed keyword search of various content sources, including web sites and other sources on a wide area network. The results of the keyword search are aggregated into a single page or document, preferably with filtering to remove page elements not well suited for display on a mobile device. Occurrences of specific terms on this dynamically generated page may similarly be transformed into links, such that the user can browse content from various sources within a confined environment. | 12-11-2008 |
20080304436 | WIRELESS VIRAL MESH NETWORK AND PROCESS FOR USING THE SAME - A sending subscriber system may participate in a wireless network by generating a message to transmit in a wireless network, identifying a local wireless subscriber system with which communications may be established, and determining whether to use the wireless local subscriber system as a relay. | 12-11-2008 |
20080263149 | DIRECT FILE TRANSFER BETWEEN SUBSCRIBERS OF A COMMUNICATIONS SYSTEM - Systems and techniques for transferring a file from a first client associated with a first subscriber to a communications system to a second client associated with a second subscriber to the communications system by connecting from the first client to a communications system host; sending, through the communications system host, a request to the second client to establish a direct connection to the second client; when the second client accepts the request, establishing a direct connection to the second client that bypasses the communications system host; and transferring a file over the direct connection. | 10-23-2008 |
20080249983 | IDENTIFYING A RESULT RESPONSIVE TO A CURRENT LOCATION OF A CLIENT DEVICE - A method for identifying a result responsive to a current location of a client device includes receiving, form a client device and at a host, a search query that includes a point of interest and a current location of the client device. The method also includes automatically updating the search query as the current location of the client device changes and instructing the host to identify a potential location associated with the point of interest and located within a user-defined proximity from the current location of the client device. | 10-09-2008 |
20080229233 | PUSHED FUNCTIONALITY - Delivering accessory-window content to a client includes sending Internet content and accessory-window content to a client. The accessory-window content is configured to enable rendering of the accessory-window concurrent with a window used to display the Internet content, and monitoring user activity outside of the rendered accessory-window for specific activities or situations by a process related to the accessory-window. The accessory-window content is also configured to enable activating an accessory-window trigger in response to detecting one or more of the specific activities or situations, and sending an indication that the accessory-window trigger has been activated to the host. The method also includes receiving an indication that the accessory-window trigger has been activated from the client, and determining content for an accessory-window response based on the received indication. The method further includes retrieving the determined content for the accessory-window response, and sending data associated with the retrieved content to the client. The data enables the client to add, remove, or change content within the rendered accessory-window. | 09-18-2008 |
20080222125 | ANALYZING A QUERY LOG FOR USE IN MANAGING CATEGORY-SPECIFIC ELECTRONIC CONTENT - Providing category-specific electronic content includes receiving a request for electronic content. The request has an attribute. The attribute of the received request is compared to an attribute related to a query included in a log of search queries. An indication of a category that represents a search query from a log of search queries that is related to an attribute that matches the attribute of the received request is accessed, and electronic content that is representative of the identified category is accessed and provided. | 09-11-2008 |
20080216154 | IDENTITY-BASED WIRELESS DEVICE CONFIGURATION - Techniques are provided for the relating identity information with wireless configuration information for a wireless device or a wireless network. A trusted system may be used to generate wireless configuration parameters for a wireless network based on identity information. The identity-based wireless configuration information may be stored on the trusted system remote to the wireless network and accessible to the wireless device. The wireless configuration may be migrated from the trusted system to the wireless device. | 09-04-2008 |
20080209351 | USER PROFILE SNAPSHOTS - A method for personalizing content for a particular user using profile snapshots in a computing system comprising a user interface configured to display content. The method comprises identifying a first snapshot of a user profile at a first point in time, identifying a second snapshot of a user profile at a second point in time occurring after the first point in time, maintaining a history of the first snapshot and the second snapshot, and allowing a user to access the history of the first snapshot and the second snapshot. | 08-28-2008 |
20080209350 | ACTIVE AND PASSIVE PERSONALIZATION TECHNIQUES - A method for personalizing content for a particular user in a computing system comprising a user interface configured to display content. The method comprises identifying a long term profile having one or more features in a feature set and a long term level of importance associated with each term in the feature set, identifying a short term profile having one or more features in the feature set and a short term level of importance associated with each term in the feature set, identifying input related to the display of the one or more content items on the user interface, and using the input to modify the short term level of importance and the long term level of importance associated with each term in the feature set to form a modified user interest set. | 08-28-2008 |
20080209349 | PERSONALIZATION TECHNIQUES USING IMAGE CLOUDS - Systems and methods for personalization using image clouds to represent content. Image clouds can be used to identify initial user interest, present recommended content, present popular content, present search results, and present user profile information. Image clouds are interactive, allowing users to select images displayed in the image cloud, which can contribute to presenting more personalized content as well as updating a user's profile. | 08-28-2008 |
20080209343 | CONTENT RECOMMENDATION USING THIRD PARTY PROFILES - A method for personalizing content for a particular user in a computing system comprising a user interface configured to display content. The method comprises identifying one or more features of a short term profile of a user that are not included in a long term profile of the user, using the one or more features to identify one or more third party profiles having features that substantially match the one or more features of the user's short term profile, accessing the identified one or more third party profiles, and providing one or more content items included in the third party profile to the user, the one or more content items having associated features that match the one or more features of the short term profile. An alternative method comprises accessing one or more third party profiles that are not a profile of the user, and using the accessed third party profile to identify a plurality of content items for recommendation to the user based on a feature set of the third party profile. | 08-28-2008 |
20080209340 | PEER-TO-PEER ACCESS OF PERSONALIZED PROFILES USING CONTENT INTERMEDIARY - A method for personalizing content for a particular user in a computing system comprising a user interface configured to display content. The method comprises identifying a content item accessed by a user, identifying features associated with the content item; using the features of the content item to identify one or more third party profiles that substantially match a content profile of the content item, and displaying a list of the identified third party profiles. | 08-28-2008 |
20080209339 | PERSONALIZATION TECHNIQUES USING IMAGE CLOUDS - Systems and methods for personalization using image clouds to represent content. Image clouds can be used to identify initial user interest, present recommended content, present popular content, present search results, and present user profile information. Image clouds are interactive, allowing users to select images displayed in the image cloud, which can contribute to presenting more personalized content as well as updating a user's profile. | 08-28-2008 |
20080201323 | METHOD AND APPARATUS FOR A RANKING ENGINE - A computer-implemented method is provided for ranking files from an Internet search. In one embodiment, the method comprises assigning a score to each file based on at least one of the following factors: recency, editorial popularity, clickthru popularity, favorites metadata, or favorites collaborative filtering. The file may be organized based on the assigned scores to provide users with more accurate search results. | 08-21-2008 |