Patent application number | Description | Published |
20080275786 | SYSTEM AND METHOD FOR INCREASING PURCHASE CONVERSION RATES - A system and method is provided for increasing purchase conversion rates for prospective online buyers of products and services by offering an incentive to encourage a quicker decision to complete the purchase. In those cases when a trial is offered, the present invention incentivizes the prospective buyer to skip the trial and proceed immediately to purchase the product or service being offered. The system includes a timer that is visible to the customer and counts the elapsed time since the offer was made and an offer statement that describes the incentive being offered in order to proceed with the purchase. The timer in turn counts down a time until the incentive offer expires. There may further be a hidden prize offered by the seller, to be won by the potential purchaser if they make the decision to buy at a specific time during the offer period. | 11-06-2008 |
20080305462 | METHOD FOR IDENTIFYING AND INSTRUCTING TOP LEVEL ATHLETES - A method and system is provided for screening and identifying athletes that have the highest potential within their chosen sport and providing a training and development environment for these athletes at the elite and super elite level of their respective sport. The system employs a nine part integrated system that is structured in a manner that assists in identifying those player that are the most able to benefit from intensive training to move them from a top-level athlete to an elite athlete. The steps generally include prescreening, athlete selection, pre-training/preparation, intensive training, progress monitoring, player family support and communication, cultural exposure, professional career placement and post career support and counseling. In this context, a comprehensive approach is provided for identifying talented athletes and providing a training and development environment for these athletes. | 12-11-2008 |
20100305847 | NAVIGATION SYSTEM AND METHOD - A non-scaled, linearly compressed pictographic mapping system is provided for the visual display of information in a navigational aid. Unlike today's road maps which use a point-arc-polygon paradigm, the new mapping uses a non-scaled, linearly-compressed pictographic design that shows roads as linear pictograms. The display has a columnar layout, whereby the descriptive elements are grouped together by type, and displayed one above the other in columns. The maps may also contain icons representing points of interest. In this manner, the mapping paradigm also serves to increase traveler safety, provide navigation assistance during address-less trips, create valuable advertising space and new promotional opportunities, and dramatically increases the travelers' communications and entertainment options. | 12-02-2010 |
20100318291 | NAVIGATION SYSTEM AND METHOD - A non-scaled, linearly compressed pictographic mapping system is provided for the visual display of information in a navigational aid. Unlike today's road maps which use a point-arc-polygon paradigm, the new mapping uses a non-scaled, linearly-compressed pictographic design that shows roads as linear pictograms. The display has a columnar layout, whereby the descriptive elements are grouped together by type, and displayed one above the other in columns. The maps may also contain icons representing points of interest arranged in a cloud fashion. In this manner, the mapping paradigm also serves to increase traveler safety, provide navigation assistance during address-less trips, create valuable advertising space and new promotional opportunities, and dramatically increases the travelers' communications and entertainment options. | 12-16-2010 |
20110230256 | SYSTEM AND METHOD FOR DELIVERING ELECTRONIC MEDIA CONTENT ON A MULTI-LEVEL BASIS - A system and method for delivering an electronic video game allows a consumer to purchase the game in sequential portions. The video game is broken down into incremental portions that are each individually available for sale. A consumer purchases a first portion of the video game that contains the first level, or set of levels, of the game. When the first portion is completed by the consumer, the consumer can then buy the next sequential portion for an additional incremental sum of money. The incremental portions may contain one or more levels. Similarly, the initial purchase vehicle may contain the entire game and a consumer purchases key codes to access subsequent portions of the game. | 09-22-2011 |
20140195147 | NAVIGATION SYSTEM AND METHOD - A non-scaled, linearly compressed pictographic mapping system is provided for the visual display of information in a navigational aid. Unlike today's road maps which use a point-arc-polygon paradigm, the new mapping uses a non-scaled, linearly-compressed pictographic design that shows roads as linear pictograms. The display has a columnar layout, whereby the descriptive elements are grouped together by type, and displayed one above the other in columns. The maps may also contain icons representing points of interest arranged in a cloud fashion. In this manner, the mapping paradigm also serves to increase traveler safety, provide navigation assistance during address-less trips, create valuable advertising space and new promotional opportunities, and dramatically increases the travelers' communications and entertainment options. | 07-10-2014 |
20140271995 | DRINKING WATER COMPOSITION AND METHOD OF PRODUCTION - A composition for drinking water and a method for preparing the same are presented. The composition includes a volume of water and a predetermined amount of each of calcium, magnesium, potassium, and silica. The method includes obtaining the volume of water, testing the volume of water to determine the amount of these four minerals in the volume, and adding a mineral packet to the volume of water, wherein the mineral packet includes predetermined amounts of these four minerals. | 09-18-2014 |
Patent application number | Description | Published |
20130309230 | Modified Antibody Compositions, Methods of Making and Using Thereof - The present disclosure provides modified antibodies which contain an antibody or antibody fragment (AB) modified with a masking moiety (MM). Such modified antibodies can be further coupled to a cleavable moiety (CM), resulting in activatable antibodies (AAs), wherein the CM is capable of being cleaved, reduced, photolysed, or otherwise modified. AAs can exhibit an activatable conformation such that the AB is more accessible to a target after, for example, removal of the MM by cleavage, reduction, or photolysis of the CM in the presence of an agent capable of cleaving, reducing, or photolysing the CM. The disclosure further provides methods of making and using such modified antibodies and activatable antibodies. | 11-21-2013 |
20140024810 | Modified Antibody Compositions, Methods of Making and Using Thereof - The present disclosure provides modified antibodies which contain an antibody or antibody fragment (AB) modified with a masking moiety (MM). Such modified antibodies can be further coupled to a cleavable moiety (CM), resulting in activatable antibodies (AAs), wherein the CM is capable of being cleaved, reduced, photolysed, or otherwise modified. AAs can exhibit an activatable conformation such that the AB is more accessible to a target after, for example, removal of the MM by cleavage, reduction, or photolysis of the CM in the presence of an agent capable of cleaving, reducing, or photolysing the CM. The disclosure further provides methods of making and using such modified antibodies and activatable antibodies. | 01-23-2014 |
Patent application number | Description | Published |
20120149061 | Modified Antibody Compositions, Methods of Making and Using Thereof - The present disclosure provides modified antibodies which contain an antibody or antibody fragment (AB) modified with a masking moiety (MM). Such modified antibodies can be further coupled to a cleavable moiety (CM), resulting in activatable antibodies (AAs), wherein the CM is capable of being cleaved, reduced, photolysed, or otherwise modified. AAs can exhibit an activatable conformation such that the AB is more accessible to a target after, for example, removal of the MM by cleavage, reduction, or photolysis of the CM in the presence of an agent capable of cleaving, reducing, or photolysing the CM. The disclosure further provides methods of making and using such modified antibodies and activatable antibodies. | 06-14-2012 |
20120207756 | Modified Antibody Compositions, Methods of Making and Using Thereof - The present disclosure provides modified antibodies which contain an antibody or antibody fragment (AB) modified with a masking moiety (MM). Such modified antibodies can be further coupled to a cleavable moiety (CM), resulting in activatable antibodies (AAs), wherein the CM is capable of being cleaved, reduced, photolysed, or otherwise modified. AAs can exhibit an activatable conformation such that the AB is more accessible to a target after, for example, removal of the MM by cleavage, reduction, or photolysis of the CM in the presence of an agent capable of cleaving, reducing, or photolysing the CM. The disclosure further provides methods of making and using such modified antibodies and activatable antibodies. | 08-16-2012 |
Patent application number | Description | Published |
20100088399 | Enterprise security setup with prequalified and authenticated peer group enabled for secure DHCP and secure ARP/RARP - The method enables prevention of attacks on the network using layer-2 to layer-4 internet protocols. A secure local area network (LAN) is established having a secure peer group (SPG) of member entities with each member entity having its media access control (MAC) address locked to its own identity. A secure server within the LAN is configured as administrative and dynamic host configuration protocol (DHCP) server enabled to issue IP addresses. When using DHCP, address resolution protocol (ARP), and reverse address resolution protocol (RARP), the identity of the requesting entity is verified and entity is confirmed as legitimate. Data sent during transactions is encrypted using the public key of the receiving entity. These steps enable verified and secure establishment of IP to MAC binding during DHCP and ARP, and an enabler for secure connectivity between members of the SPG for eliminating attacks on the secure LAN. | 04-08-2010 |
20100088748 | Secure peer group network and method thereof by locking a mac address to an entity at physical layer - A system and method of locking media access control (MAC) address of each entity to the entity's identity for formation of a secure peer group is disclosed. The identity of each entity includes at least the public key from the public-private key pair from public key infrastructure (PKI) and the entities' MAC address. Using the unique identifying features a security server links and locks the MAC address of the entity to its identity so that no other entity can identify itself as the owner of that MAC address to the secure server. A group of such entities and secure server with locked MAC addresses form a qualified and verifiable secure peer group enabled to establish a secure LAN. | 04-08-2010 |
20110055571 | METHOD AND SYSTEM FOR PREVENTING LOWER-LAYER LEVEL ATTACKS IN A NETWORK - A method for preventing lower-layer level attacks committed against entities in a network. The method comprises forming a secure peer group (SPG) of member entities in the network, wherein each of the member entities is configured with a media access control (MAC) address locked to its own identity and a Internet protocol (IP) address linked to its MAC address; establishing a secure handshake between at least a source member entity and a target member entity of the SPG by mutually authenticating of the source member entity and the target member entity; and securely transferring data from the source member entity to the target member entity. | 03-03-2011 |
20110246772 | Secure client-side communication between multiple domains - Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for dynamic multi-domain and/or multi-tenant environments while allowing for granular security or specific security of messages and operations with regard to users, user sessions, groups, organizations, permissions sets, applications, or any other logical delineation. Such methods and systems may involve a variety of security components, for example, at least one set of instructions including a plurality of defined instruction to be utilized by users of the set of instructions to communicate, and cryptographic construct data in order to verify the data integrity and the authenticity of messages sent and received using the secure client-side communication between multiple domains. | 10-06-2011 |
20110321148 | Methods And Systems For Providing a Token-Based Application Firewall Correlation - Token-based firewall functionality. A request is received for access to a resource from a remote user device, the request received by an application firewall. A token is associated with the request. The token and associated information are stored in an event correlator coupled with the application firewall. The token is associated with one or more subsequent actions by the resource in response to receiving the request. A response to the request including the token is generated. The response with the token is transmitted to the remote user device via the application firewall. The application firewall analyzes the response and determines an action to be taken on the response based on the token and the associated information. | 12-29-2011 |
20110321150 | Methods And Systems For Context-Based Application Firewalls - Context-based application firewall functionality. A user session is initiated with a client device. The user session allows access a remote resource on a server device coupled with the client device over a network. The connection between the client device and the remote resource is through an application firewall. An application firewall context setup is performed with the application firewall in response to the user session. The application firewall context comprises firewall context information to be used during the user session to perform network and application security operations with the application firewall. A response is created to provide information from the remote resource to the client device. The response includes metadata to be used to update the firewall context information. The firewall context information is updated with the application firewall based on the metadata. The response is transmitted to the client device. | 12-29-2011 |
20110321151 | Methods And Systems For Providing Context-Based Outbound Processing Application Firewalls - Outbound processing with application firewalls. An outbound message is generated with an application. The outbound message includes at least a trustworthiness indicator and/or marking information for the one or more portions of the outbound message. The outbound message is received by an application firewall. The outbound message is analyzed based on the trustworthiness indicator and/or marking information, and context information. An action is performed on the outbound message based on the trustworthiness indicator and/or marking information, and the context information. | 12-29-2011 |
20110321162 | Methods And Systems For Providing Security For Page Framing - Techniques for analyzing a page to be presented by a browser running on a computing platform. The page is disabled. The page is tested to determine if the page is framed by a second page. The page is enabled if the testing indicates that the page is not framed by a second page. Each level of a hierarchy of framed pages is inspected to determine whether each level is authorized. The page is enabled if the inspecting indicates that each level of the hierarchy of framed pages is authorized. | 12-29-2011 |
20130091350 | METHODS AND SYSTEMS FOR PROXYING DATA - Methods and systems are provided for proxying data between an application server and a client device. One exemplary application system includes an application server to generate a virtual application and a proxy server coupled to the application server over a network to provide the virtual application to a client device. The proxy server receives input data from the client device and provides the input data to the application server, wherein the application server encodes the input data for an action in response to authenticating the proxy server and provides the data encoded for the action to the proxy server. The proxy server performs the action on the data and provides the result to the client device. | 04-11-2013 |
20130138963 | STATE-MAINTAINED MULTI-PARTY SIGNATURES - A hash module of a mail sender creates a hash data context structure. The hash module processes the headers and the body of an e-mail message in the order required, for example by the DKIM specification, until the data to be hashed has been input. The hash module converts the context structure into printable characters and the encoded structure is transmitted over the Internet or other network to the next participating system. The token authority's hash module decodes the context back into binary form. After ensuring business logic is satisfied, it generates additional headers required for signature, which are then added to the developing hash. The hash module finalizes the hash function and creates the hash value. The authorization module creates the signature and returns it to the e-mail module, which attaches the signature to the message and transmits it to the destination mailbox provider, which verifies the token. | 05-30-2013 |
20130326210 | SECURE CLIENT-SIDE COMMUNICATION BETWEEN MULTIPLE DOMAINS - Methods and systems for secure client-side communication between multiple domains is provided. Such methods and systems can provide for decreased communication latency particularly effective for dynamic multi-domain and/or multi-tenant environments while allowing for granular security or specific security of messages and operations with regard to users, user sessions, groups, organizations, permissions sets, applications, or any other logical delineation. Such methods and systems may involve a variety of security components, for example, at least one set of instructions including a plurality of defined instruction to be utilized by users of the set of instructions to communicate, and cryptographic construct data in order to verify the data integrity and the authenticity of messages sent and received using the secure client-side communication between multiple domains. | 12-05-2013 |
20140173571 | SYSTEM AND METHOD FOR DYNAMIC ANALYSIS BYTECODE INJECTION FOR APPLICATION DATAFLOW - Bytecode is injected to create a source tracking object for a data object received from a data source and to record information associated with the data source into the source tracking object. Bytecode is injected to create a copy of the data object for a tracking event in an application program, to create a flow tracking object for the tracking event, and to record information associated with the tracking event into the flow tracking object as the tracking event processes the copy of the data object. Bytecode is injected to create a sink tracking object for outputting the copy of the data object to a data sink and to record information associated with the data sink into the sink tracking object. Bytecode is injected to output the source tracking object, the flow tracking object, and the sink tracking object as dynamic analysis of dataflow in the application program. | 06-19-2014 |
20140173741 | SYSTEM AND METHOD FOR DYNAMIC ANALYSIS TRACKING OBJECTS FOR APPLICATION DATAFLOW - Systems and methods are provided for dynamic analysis tracking objects for application dataflow. A system receives a data object from a data source, creates a source tracking object for the data object, and records information associated with the data source into the source tracking object. The system creates a copy of the data object for a tracking event in the application program, creates a flow tracking object for the tracking event, and records information associated with the tracking event into the flow tracking object as the tracking event processes the copy of the data object. The system outputs the copy of the data object to a data sink, creates a sink tracking object for the data sink, and records information associated with the data sink into the sink tracking object. The system outputs the source tracking object, the flow tracking object, and the sink tracking object as dynamic analysis of dataflow in the application program. | 06-19-2014 |
20140173742 | SYSTEM AND METHOD FOR DYNAMIC ANALYSIS WRAPPER OBJECTS FOR APPLICATION DATAFLOW - Systems and methods are provided for dynamic analysis wrapper objects for application dataflow. A system creates a wrapper object that points to a data object received from a data source, creates a source tracking object for the wrapper object, and records information associated with the data source into the source tracking object. The system creates a copy of the wrapper object for a tracking event in an application program, creates a flow tracking object for the tracking event, and records information associated with the tracking event into the flow tracking object as the tracking event processes the copy of the wrapper object. The system outputs the copy of the wrapper object to a data sink for the application program, creates a sink tracking object for the data sink, and records information associated with the data sink into the sink tracking object. The system outputs the source tracking object, the flow tracking object, and the sink tracking object as dynamic analysis of dataflow in the application program. | 06-19-2014 |
20140173743 | SYSTEM AND METHOD FOR DYNAMIC ANALYSIS TRACKING OBJECT ASSOCIATIONS FOR APPLICATION DATAFLOW - Data source information is recorded into a source tracking object embedded in a wrapper object pointing to a data object from the data source. Tracking event information is recorded into a flow tracking object embedded in a wrapper object copy as the tracking event processes the wrapper object copy. Other tracking event information is recorded into another flow tracking object embedded in another wrapper object as the other tracking event processes the other wrapper object. The flow tracking object is associated with the other flow tracking object in response to a field retrieval of the wrapper object copy from the other wrapper object. The wrapper object copy is output to a data sink. Data sink information is recorded into a sink tracking object embedded in the wrapper object copy. The tracking objects are output as dynamic analysis of dataflow in the application program. | 06-19-2014 |