Patent application number | Description | Published |
20100076952 | SELF CONTAINED MULTI-DIMENSIONAL TRAFFIC DATA REPORTING AND ANALYSIS IN A LARGE SCALE SEARCH HOSTING SYSTEM - A method is provided for reporting and analyzing user search behaviors in a large scale heterogeneous search engine platform. Content repository managers want to understand how users search for content in their repository including what categories and attributes users are interested in, how users were referred to the site, and which searchable items were viewed. The method provides a low-cost alternative to OLAP and data warehouse solutions and exploits the scalability and user interface of a search engine. Furthermore, the taxonomy of the content repository needed for analysis is already known to the search engine, and need not be exported or represented in a different format required by another tool. Data analysis can be conducted interactively and in real-time. | 03-25-2010 |
20110029561 | IMAGE SIMILARITY FROM DISPARATE SOURCES - A search engine determines a set of other images that are similar to a user-selected image, and presents those other images to the user. In determining whether two images are sufficiently similar to each other to merit presentation of one, the search engine determines a Euclidean distance between separate feature vectors that are associated with each of the images. Each such vector indicates diverse types of information that is known about the associated image. The types of information included within such a vector may include attributes that reflect visual characteristics that are visible in an image, verbal tags that have been associated with the image users in a community of users, concepts derived from those tags, coordinates that reflect a geographic location at which a camera that produced the image was when the camera produced the image, and concepts related to groups with which the image is associated. | 02-03-2011 |
20120011129 | FACETED EXPLORATION OF MEDIA COLLECTIONS - Exemplary methods and apparatuses are disclosed that may be used to provide or otherwise support extraction of objects and facets from one or more extraction corpora and ranking of said facets using multiple ranking corpora. | 01-12-2012 |
Patent application number | Description | Published |
20130159088 | PROVIDING OFFERS THAT SPECIFY A VARIABLE DISCOUNT WITH RESPECT TO A PRICE OF A GOOD AND/OR SERVICE - Techniques are described herein for providing discounted offers for goods and/or services. In one example, the discounted offer may specify a variable discount. In an aspect of this example, an amount of the variable discount may decrease for each customer or group thereof who accepts the offer. In accordance with this aspect, customer(s) who accept the offer earlier than other customers may be given a greater discount. In another aspect, the amount of the discount may vary for successive predetermined time intervals. For instance, the amount of the variable discount may be greater for customer(s) who accept the offer during a predetermined time interval that occurs earlier than another predetermined time interval. Accordingly, the amount of the discount may decrease for temporally successive predetermined time intervals. In both aspects, once a specified number of customers accept the discounted offer, the discounted offer may thereafter specify a fixed discount. | 06-20-2013 |
20130268328 | GENERATING A DEAL SCORE TO INDICATE A RELATIVE VALUE OF AN OFFER - Techniques are described herein for generating a deal score to indicate a relative value of an offer for a commerce element. In one example, the deal score for a particular offer is based on a difference between a discounted price specified by the particular offer and an average of discounted price(s) specified by other offer(s). If the difference reaches a threshold, then a relatively high deal score is generated. Otherwise, a relatively low deal score is generated. In another example, the deal score is based on a difference between an intermediate value and the discounted price specified by the present offer. The intermediate value may be provided by combining discounted price(s) specified by other offer(s) and the non-discounted price of the commerce element being offered. If the difference reaches a threshold, then a relatively high deal score is generated. Otherwise, a relatively low deal score is generated. | 10-10-2013 |
Patent application number | Description | Published |
20090094671 | System, Method and Apparatus for Providing Security in an IP-Based End User Device - The present invention provides a system, method and apparatus for providing security in an IP-based end user device, such personal computer clients, hard phones, soft phones, cellular phones, dual-mode phones, handheld communication devices, wireless communications devices and any other device capable of supporting real time IP-based applications. An application layer, a TCP/IP layer and a datalink layer of the IP-based end user device are monitored. Whenever an incoming session is detected and analyzed, the incoming session is accepted whenever one or more session security parameter(s) are satisfied and the incoming session is denied whenever the session security parameter(s) are not satisfied. Whenever an incoming packet is detected and analyzed, the incoming packet is processed whenever one or more packet security parameter(s) are satisfied and the incoming packet is dropped whenever the packet security parameter(s) are not satisfied. | 04-09-2009 |
20090144820 | System, Method and Apparatus for Protecting a Network or Device Against High Volume Attacks - The present invention provides a system, method and apparatus for protecting against high volume attacks. The present invention receives a packet, determines a source of the received packet, and updates a tree-based data structure based on the source of the received packet. The received packet is accepted or passed on whenever one or more statistics stored within the tree-based data structure do not exceed a threshold. The received packet is dropped whenever the one or more statistics exceed the threshold. The present invention can be implemented in hardware, software or a combination thereof. The software will implement the steps as one or more code segments of a computer program embodied on a computer readable medium. | 06-04-2009 |
20090168756 | System, Method and Apparatus for Clientless Two Factor Authentication in VoIP Networks - The present invention provides a system, method and apparatus for authenticating an Internet Protocol (IP) phone and a user of the IP phone by determining whether the IP phone is an authorized device, and whenever the IP phone is authorized and a trigger condition occurs, determining whether the user of the IP phone is authorized. The user authorization process initiates a call to the IP phone, sends a request for a passcode to the IP phone, sends a message to disable the IP phone whenever the passcode is invalid, and terminates the call. The user authentication process uses an in-band channel and the IP phone does not run a two factor authentication client application during the authentication process. | 07-02-2009 |
20090217039 | System, Method and Apparatus for Authenticating Calls - The present invention provides a system, method and apparatus for authenticating calls that is a robust Anti-vishing solution. The present invention can identify Caller ID spoofing, verify dialed number to detect man-in-the middle and verify called party against dialed digits to detect impersonation. This solution can handle calls coming from any phone any where with little impact on user experience. Two separate solutions are tailored for smart phones (communication devices capable of running application software) and traditional phones to reduce the impact to user experience while providing robust verification. | 08-27-2009 |
Patent application number | Description | Published |
20100241690 | COMPONENT AND DEPENDENCY DISCOVERY - Methods, systems, and computer-readable media are disclosed for discovering components and dependencies in a distributed computing environment. A particular method includes discovering a first component and a second component of a distributed computing environment, where the first component and the second component are associated with different discoverable technologies. Each component is discovered based on a match between a characteristic of the component and a technology specification associated with the discoverable technology. The method also includes discovering a dependency between the first component and the second component. | 09-23-2010 |
20100251263 | MONITORING OF DISTRIBUTED APPLICATIONS - Methods, systems, and computer-readable media are disclosed for monitoring a distributed application. A particular method identifies a plurality of components of a distributed application. The method also identifies a specific technology associated with a particular component and attaches a technology specific interceptor to the particular component based on the identified specific technology. The method includes intercepting messages that are sent by or received by the particular component using the technology specific interceptor. At least one potential work item is generated based on the intercepted messages. The method includes determining whether to schedule the at least one potential work item for execution based on a predicted impact of the at least one work potential item on performance of the distributed application. | 09-30-2010 |
20120017120 | MONITORING ACTIVITY WITH RESPECT TO A DISTRIBUTED APPLICATION - Techniques are described herein that are capable of monitoring activity with respect to a distributed application. A server system includes logical tiers, each including processing system(s) configured to process messages in accordance with a respective protocol (e.g., an ASP.net® protocol, WCF protocol, SQL protocol, etc.). When a user initiates an activity with respect to a distributed application, hops are performed between the logical tiers and/or between components of the distributed application to complete the requested activity. A hop is a transfer of a message or a procedure call from one processing system to another processing system. A common identifier may be assigned to each of the hops that are performed with regard to the activity. If a failure occurs with respect to the activity, the common identifier may be used to gather information regarding the hops. For instance, the information may be used to determine a source of the failure. | 01-19-2012 |
20120023487 | MEASURING ACTUAL END USER PERFORMANCE AND AVAILABILITY OF WEB APPLICATIONS - Techniques for monitoring web application performance are provided. A request for a web application is received at an application server. A response pipeline at the application server generates client application code corresponding to the requested web application. The client application code is intercepted in the response pipeline. Instrumentation code is inserted into the intercepted client application code to generate an instrumented client application code. The instrumentation code is configured to be executed when the instrumented client application code is rendered at the client to capture performance information at the client, and is configured to transmit the captured performance information from the client. | 01-26-2012 |