Patent application number | Description | Published |
20090292738 | Conducting An Individualized, Virtually Moderated, Virtual Real Time Methodical Debate - Disclosed herein is a computer implemented method and system for conducting an individualized, virtually moderated, and virtual real time debate. Debating topics and debating rules are defined for the debate. A group of panelists is selected for the debate based on the debating topics. An electronic debating platform is provided to the panelists for receiving one or more key points, responses, and counter-responses contributed by each of the panelists in non real time. The key points, the responses, and the counter-responses are governed by the debating rules. The prerecorded key points, responses, counter-responses, and one or more information components relevant to each of the key points are stringed together in sequence. The debate is presented to a viewer on a multimedia presentation layer. The presentation of the debate is customized by enabling the viewer to selectively navigate through the presentation using the sequenced key points, responses, counter-responses, and information components. | 11-26-2009 |
20160054874 | Conducting An Individualized, Virtually Moderated, Virtual Real Time Methodical Debate - Disclosed herein is a computer implemented method and system for conducting an individualized, virtually moderated, and virtual real time debate. Debating topics and debating rules are defined for the debate. A group of panelists is selected for the debate based on the debating topics. An electronic debating platform is provided to the panelists for receiving one or more key points, responses, and counter-responses contributed by each of the panelists in non real time. The key points, the responses, and the counter-responses are governed by the debating rules. The prerecorded key points, responses, counter-responses, and one or more information components relevant to each of the key points are stringed together in sequence. The debate is presented to a viewer on a multimedia presentation layer. The presentation of the debate is customized by enabling the viewer to selectively navigate through the presentation using the sequenced key points, responses, counter-responses, and information components. | 02-25-2016 |
Patent application number | Description | Published |
20090240689 | System, method, and software for researching, analyzing, and comparing expert witnesses - The present inventors devised, among other things, system, methods, and interfaces for researching, evaluating, and comparing expert witnesses. One exemplary system includes interfaces that facilitate users entering queries regarding experts based on name or subject matter and filtering search results based on damage awards, case types, attorneys, clients and date range. The system also enables side-by-side comparisons of the cumulative litigation history for multiple experts, and provides an expert challenge report that indicates whether an expert has been challenged in past litigation, the result of any challenges, the presiding judges in the any challenges, and the text of the challenged testimony. | 09-24-2009 |
20120143851 | SYSTEM, METHOD, AND SOFTWARE FOR RESEARCHING, ANALYZING AND COMPARING EXPERT WITNESSES - The present inventors devised, among other things, system, methods, and interfaces for researching, evaluating, and comparing expert witnesses. One exemplary system includes interfaces that facilitate users entering queries regarding experts based on name or subject matter and filtering search results based on damage awards, case types, attorneys, clients and date range. The system also enables side-by-side comparisons of the cumulative litigation history for multiple experts, and provides an expert challenge report that indicates whether an expert has been challenged in past litigation, the result of any challenges, the presiding judges in the any challenges, and the text of the challenged testimony. | 06-07-2012 |
Patent application number | Description | Published |
20080281687 | METHOD FOR DETERMINING USER INTEREST IN PRODUCTS AND SERVICES FOR TARGETED ADVERTISING - A method and apparatus that selects and sends advertisements to a user based on the user's interests as determined by the user's location information is disclosed. The method may include receiving a user's location information, updating the user's location history based on the received location information, updating the user's interest profile based on the updated location history information, selecting one or more advertisement based on the updated user's interest profile, and transmitting the selected one or more advertisement for presentation to the user. | 11-13-2008 |
20110161147 | STIMULUS/RESPONSE-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161471 | INCENTING DIVULGENCE OF INFORMATION FOR BINDING IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161472 | CLIENT-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161473 | ANALYTICS-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161474 | BROKERING INFORMATION ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20130035944 | PERSONALIZING COMMUNICATIONS BASED ON AN ESTIMATED SENSITIVITY LEVEL OF THE RECIPIENT - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130036173 | PERSONALIZING COMMUNICATIONS USING ESTIMATES OF THE RECIPIENT'S SENSITIVITY LEVEL DERIVED FROM RESPONSES TO COMMUNICATIONS - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130036174 | PERSONALIZING COMMUNICATIONS BASED ON AN ESTIMATED SENSITIVITY LEVEL OF THE RECIPIENT - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130132330 | MANAGEMENT OF PRIVACY SETTINGS FOR A USER DEVICE - A system and methods of managing privacy settings of a user are presented here. The system obtains context information that is indicative of a contextual scenario associated with operation of a user device and determines, with a first analytics system, a first set of privacy settings predictions that is influenced at least in part by the context information. A second analytics system is used to determine a second set of privacy settings predictions that is influenced at least in part by the context information. When the first set of privacy settings predictions differ from the second set of privacy settings predictions by at least a threshold amount, the system issues a query for user-specified privacy settings for the contextual scenario. | 05-23-2013 |
20130346414 | Correlation Engine and Method for Granular Meta-Content Having Arbitrary Non-Uniform Granularity - One disclosed method includes receiving correlation instructions related to a plurality of meta-content elements that are associated with a primary content. The primary content may be multimedia content such as, but not limited to, an audiovisual content. The method includes performing a correlation in response to receiving the instructions. The correlation is between the meta-content elements, where the meta-content elements each have an arbitrary granularity defining meta-content segments. The method returns a result based on the correlation. Another disclosed method include receiving a request having correlation instructions related to a plurality of meta-content elements, where the meta-content elements are associated with a primary content. Again, each meta-content element has an arbitrary granularity defining meta-content segments. The method includes determining, in response to receiving the request, a composite of meta-content segments of the plurality of meta-content elements, based on the correlation instructions. | 12-26-2013 |
20130347056 | Content Rights Protection with Arbitrary Correlation of Second Content - A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity. | 12-26-2013 |
20130347057 | Privacy Manager for Restricting Correlation of Meta-Content Having Protected Information Based on Privacy Rules - A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions. | 12-26-2013 |
20140245452 | RESPONDING TO A POSSIBLE PRIVACY LEAK - When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference. | 08-28-2014 |
Patent application number | Description | Published |
20090203183 | Method for integrating SIGE NPN and Vertical PNP Devices - According to one exemplary embodiment, a method for forming an NPN and a vertical PNP device on a substrate comprises forming an insulating layer over an NPN region and a PNP region of the substrate. The method further comprises forming a buffer layer on the insulating layer and forming an opening in the buffer layer and the insulating layer in the NPN region, where the opening exposes the substrate. The method further comprises forming a semiconductor layer on the buffer layer and in the opening in the NPN region, where the semiconductor layer has a first portion situated in the opening and a second portion situated on the buffer layer in the PNP region. The first portion of the semiconductor layer forms a single crystal base of the NPN device and the second portion of the semiconductor layer forms a polycrystalline emitter of the vertical PNP device. | 08-13-2009 |
20130181290 | Selective Amorphization for Electrical Signal Isolation and Linearity in SOI Structures - Provided is a structure for improved electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and a method for the structure's fabrication. The structure comprises a gate situated on the top semiconductor layer, the top semiconductor layer situated over a base oxide layer, and the base oxide layer situated over a handle wafer. The top surface of the handle wafer is amorphized by an inert implant of Xenon or Argon to reduce carrier mobility in the handle wafer and improve electrical signal isolation between the adjacent devices situated in the top semiconductor layer. | 07-18-2013 |
20130181321 | SOI Structure and Method for Utilizing Trenches for Signal Isolation and Linearity - Disclosed is a structure for improved electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and an associated method for the structure's fabrication. The structure comprises a first portion of a trench extending through the top semiconductor layer and through a base oxide layer below the top semiconductor layer. A handle wafer is situated below the base oxide layer and a second portion of the trench, having sloped sidewalls, extends into the handle wafer. The sloped sidewalls are amorphized by an implant, for example, Xenon or Argon, to reduce carrier mobility in the handle wafer and improve electrical signal isolation between the adjacent devices situated in the top semiconductor layer. | 07-18-2013 |
20130181322 | Electrical Signal Isolation and Linearity in SOI Structures - Disclosed are a structure for electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and an associated method for the structure's fabrication. The structure includes a trench extending through the top semiconductor layer and into a base oxide layer below the top semiconductor layer. A handle wafer is situated below the base oxide layer and a void is disposed in the handle wafer below the trench. A bottom opening of the trench connects the main body of the trench with the void forming a continuous cavity including the main body, the bottom opening of the trench, and the void such that the void improves electrical signal isolation between the adjacent devices situated in the top semiconductor layer. Unetched portions of the handle wafer are then available to provide mechanical support to the top semiconductor layer. | 07-18-2013 |
20140054743 | Isolated Through Silicon Vias in RF Technologies - Disclosed are a structure for providing electrical isolation in a semiconductor substrate and an associated method for the structure's fabrication. The structure includes a deep trench isolation loop having a first depth disposed in the semiconductor substrate. A dielectric material is disposed in the deep trench isolation loop and one or more through silicon vias (TSVs), having a second depth, are disposed in the semiconductor substrate and within a perimeter of the deep trench isolation loop. A portion of the semiconductor substrate surrounding the deep trench isolation loop may be doped. A metallic filler may be disposed within the one or more TSVs and the metallic filler may be in direct electrical contact with the semiconductor substrate. | 02-27-2014 |
20140062575 | RF Switch Branch Having Improved Linearity - Disclosed is a radio frequency (RF) switch branch having a reduced nonlinearity and an associated method for reducing nonlinearity in a RF switch branch. The RF switch branch includes a primary transistor, a first transistor having power terminals electrically connected between a drain node and a body node of the primary transistor, and a second transistor having power terminals electrically connected between the body node and a source node of the primary transistor. The RF switch may further include a body resistor electrically connected between the body node of the primary transistor and ground, and a gate resistor electrically connected between a gate of the primary transistor and a gate voltage source. A gate of each of the first transistor and the second transistor is electrically connected to the gate voltage source such that the first transistor and the second transistor are ON only when the primary transistor is ON. | 03-06-2014 |
20140252535 | Integrated Passive Device Having Improved Linearity and Isolation - Disclosed is a structure for improved electrical signal isolation in a semiconductor substrate between integrated passive devices (IPDs) and an associated method for the structure's fabrication. The structure includes an amorphized region in the semiconductor substrate, a dielectric layer formed over the amorphized region, and IPDs formed over the dielectric layer. The amorphized region is not recrystallized and may be formed by utilizing an inert implant that does not charge-dope the amorphized region, while forming a plurality of charge carrier traps at an interface between the amorphized region and the dielectric layer to prevent a parasitic conduction layer from forming at the interface. The inert implant may include one of Argon, Xenon and Germanium. In many implementations, the structure does not include an active device. | 09-11-2014 |
20140363949 | Electrical Signal Isolation in Semiconductor Structures - Disclosed are a structure for electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and an associated method for the structure's fabrication. The structure includes a trench extending through the top semiconductor layer and into a base oxide layer below the top semiconductor layer. A handle wafer is situated below the base oxide layer and a void is disposed in the handle wafer below the trench. A bottom opening of the trench connects the main body of the trench with the void forming a continuous cavity including the main body, the bottom opening of the trench, and the void such that the void improves electrical signal isolation between the adjacent devices situated in the top semiconductor layer. Unetched portions of the handle wafer are then available to provide mechanical support to the top semiconductor layer. | 12-11-2014 |
20140370686 | SOI Structure for Signal Isolation and Linearity - Disclosed is a structure for improved electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and an associated method for the structure's fabrication. The structure comprises a first portion of a trench extending through the top semiconductor layer and through a base oxide layer below the top semiconductor layer. A handle wafer is situated below the base oxide layer and a second portion of the trench, having sloped sidewalls, extends into the handle wafer. The sloped sidewalls are amorphized by an implant, for example, Xenon or Argon, to reduce carrier mobility in the handle wafer and improve electrical signal isolation between the adjacent devices situated in the top semiconductor layer. | 12-18-2014 |
20140377935 | Selective Amorphization for Signal Isolation and Linearity - Provided is a structure for improved electrical signal isolation between adjacent devices situated in a top semiconductor layer of the structure and a method for the structure's fabrication. The structure comprises a gate situated on the top semiconductor layer, the top semiconductor layer situated over a base oxide layer, and the base oxide layer situated over a handle wafer. The top surface of the handle wafer is amorphized by an inert implant of Xenon or Argon to reduce carrier mobility in the handle wafer and improve electrical signal isolation between the adjacent devices situated in the top semiconductor layer. | 12-25-2014 |
20160071927 | Structure and Method for Reducing Substrate Parasitics in Semiconductor On Insulator Technology - A structure having improved electrical signal isolation and linearity is disclosed. The structure includes a buried oxide (“BOX”) layer over a bulk semiconductor layer, a device layer over the buried oxide layer, a compensation implant region near an interface of the buried oxide layer and the bulk semiconductor layer, wherein the compensation implant region is configured to substantially eliminate a parasitic conduction layer near the buried oxide layer. The compensation implant region has a doping concentration of at least one order of magnitude higher than a doping concentration of the bulk semiconductor layer. The structure includes a deep trench extending through the device layer and the buried oxide layer, and a damaged implant region in the bulk semiconductor layer near the deep trench. The structure also includes at least one transistor in the device layer. | 03-10-2016 |
Patent application number | Description | Published |
20110131069 | SYSTEM FOR MANAGING A STABLE VALUE PROTECTED INVESTMENT PLAN - Method and system to track, reconcile and administer the values of life insurance policies in separate accounts, including Stable Value Protected funds. Accordingly, targeted returns are translated into unit values on a daily basis for each fund. Additionally the system tracks restrictions (e.g., timing, amount of withdrawal and amount of reallocations) on a premium-by-premium basis, and tracks the book value, market value, duration and targeted return on a client-by-client basis. The system calculates and tracks the payments and credits applicable to a withdrawal or reallocation request, in addition to the liquidation schedules for each fund based on the payment amounts and credits of specific funds. Additionally, daily unit values are calculated given a periodic targeted return (i.e., a quarterly targeted return). | 06-02-2011 |
20120029953 | SYSTEM FOR MANAGING A STABLE VALUE PROTECTED INVESTMENT PLAN - Method and system to track, reconcile and administer the values of life insurance policies in separate accounts, including Stable Value Protected funds. Accordingly, targeted returns are translated into unit values on a daily basis for each fund. Additionally the system tracks restrictions (e.g., timing, amount of withdrawal and amount of reallocations) on a premium-by-premium basis, and tracks the book value, market value, duration and targeted return on a client-by-client basis. The system calculates and tracks the payments and credits applicable to a withdrawal or reallocation request, in addition to the liquidation schedules for each fund based on the payment amounts and credits of specific funds. Additionally, daily unit values are calculated given a periodic targeted return (i.e., a quarterly targeted return). | 02-02-2012 |
20140136244 | SYSTEM FOR MANAGING A STABLE VALUE PROTECTED INVESTMENT PLAN - Method and system to track, reconcile and administer the values of life insurance policies in separate accounts, including Stable Value Protected funds. Accordingly, targeted returns are translated into unit values on a daily basis for each fund. Additionally the system tracks restrictions (e.g., timing, amount of withdrawal and amount of reallocations) on a premium-by-premium basis, and tracks the book value, market value, duration and targeted return on a client-by-client basis. The system calculates and tracks the payments and credits applicable to a withdrawal or reallocation request, in addition to the liquidation schedules for each fund based on the payment amounts and credits of specific funds. Additionally, daily unit values are calculated given a periodic targeted return (i.e., a quarterly targeted return). | 05-15-2014 |