Patent application number | Description | Published |
20110035402 | RELATED URLS FOR TASK-ORIENTED QUERY RESULTS - Methods, computer-storage media, and graphical user interfaces are provided for identifying and presenting rich related sites for task-oriented search queries. Upon receipt of a search query input by a user, one or more query logs are analyzed to determine if the search query is a related to a task being performed by the user. If the query is determined to be a task-oriented search query, search results are identified, as is one or more Uniform Resource Locators (URLs) related to a particular search result. The related URL is presented to the user in association with the particular search result. Additional controls, e.g., search tools that facilitate querying of those URLs determined to be relevant to a particular search result, may also be provided to aid the user in performing the task at hand. | 02-10-2011 |
20110153528 | PROVIDING COMPARISON EXPERIENCES IN RESPONSE TO SEARCH QUERIES - Computer-readable media, computer systems, and computing devices facilitate providing a comparison experience to a user in response to a search query. Upon receiving a search query from the user, entities are extracted from the query. The entities are associated with entity classes. The entities, entity classes, previous user behavior, and other information are used to infer whether the user likely is engaging in a comparison task. If the inference indicates that the user likely is engaging in a comparison task, a comparison experience is generated and access to the comparison experience is provided to the user. | 06-23-2011 |
20130339335 | RELATED URLS FOR TASK-ORIENTED QUERY RESULTS - Methods, computer-storage media, and graphical user interfaces are provided for identifying and presenting rich related sites for task-oriented search queries. Upon receipt of a search query input by a user, one or more query logs are analyzed to determine if the search query is a related to a task being performed by the user. If the query is determined to be a task-oriented search query, search results are identified, as is one or more Uniform Resource Locators (URLs) related to a particular search result. The related URL is presented to the user in association with the particular search result. Additional controls, e.g., search tools that facilitate querying of those URLs determined to be relevant to a particular search result, may also be provided to aid the user in performing the task at hand. | 12-19-2013 |
20140358909 | SEARCH RESULT CONTEXTS FOR APPLICATION LAUNCH - A search service executes on one or more computing systems and searches at least one index associated with content accessible through an application based on the at least one portion of the search query to provide search results associated with the application. A search results interface returns one or more search results from the search. At least one of the search results is associated with an application identifier identifying the application. The search service ranks the search results associated with the application with other search results from at least one other search of other content based on the search query. | 12-04-2014 |
20140358916 | PERSONALIZED PRIORITIZATION OF INTEGRATED SEARCH RESULTS - A search management system receives at a computing system one or more search results from a search operation based on a search query. The search operation performed a first search on content in a database accessible through an application, a second search on local to the computing system content, and a third search on Web content. At least one of the search results from the first search is associated with an application identifier identifying the application. A search results integrator ranks the search results from the first search, the second search, and the third search in aggregation according to historical search behavior collected about a user and presents the ranked search results from the first search, the second search, and the third search in an integrated view. | 12-04-2014 |
20140379747 | IDENTIFYING RELEVANT APPS IN RESPONSE TO QUERIES - Systems, methods, and computer-readable storage media are provided for permitting users to search the content of a plurality of apps from a single search query input location. A user inputs a search query and a plurality of apps and/or the content thereof is searched to determine relevancy to the input query. If an app having relevant app content is identified, it may be determined if the app is associated with the querying user. If it is determined that the app is associated with the querying user, the information determined relevant to the input query may be presented to the user. If, it is determined that the app is not associated with the user, the user may be presented with the identity of the app and/or be directed to a location (e.g., an app store) where the user can become associated with the identified app and obtain the desired information. | 12-25-2014 |
Patent application number | Description | Published |
20080261304 | METHODS AND COMPOSITIONS FOR ENHANCING DELIVERY OF DOUBLE-STRANDED RNA OR A DOUBLE-STRANDED HYBRID NUCLEIC ACID TO REGULATE GENE EXPRESSION IN MAMMALIAN CELLS - A double-stranded RNA, preferably a small, interfering (si)RNA or a siHybrid, to which cholesterol moieties are linked. | 10-23-2008 |
20100316707 | METHODS AND COMPOSITIONS FOR ENHANCING DELIVERY OF DOUBLE-STRANDED RNA OR A DOUBLE-STRANDED HYBRID NUCLEIC ACID TO REGULATE GENE EXPRESSION IN MAMMALIAN CELLS - A delivery-enhancing peptide comprising the amino acid sequence of SEQ ID NO:11 or salt thereof. This invention is directed towards methods and compositions to administer a double-stranded ribonucleic acid to a mammal so as to effectuate transfection of the double-stranded RNA into a desired tissue of the mammal. | 12-16-2010 |
20130115629 | METHODS OF BREAST CANCER DETECTION - Methods of diagnosing breast cancers are provided. The methods include analyzing the expression patterns of biomarkers in a plurality of cells to distinguish between invasive and non-invasive cancers, usual and atypical hyperplasias, and basal-like breast cancers. Breast cancers are diagnosed based upon different combinations of the biomarkers found in nipple aspirate fluid. | 05-09-2013 |
20130130310 | ABSORBENT PAPER AND USE THEREOF FOR BREAST CANCER DETECTION - Biological samples of mammary fluid or components thereof are obtained using a breast pump device coupled with an absorbent paper or membrane, optionally facilitated by administering oxytocin to the subject. The breast pump device stimulates expression of mammary fluid and provides for collection of diagnostic samples on the absorbent paper or membrane to evaluate breast disease, including cancer. The biological sample may include fluid containing one or more of cells or cellular components, proteins, glycoproteins, peptides, nucleotides or other desired constituents comprising a breast disease marker. Absorbent paper or membrane, and methods relating to the paper or membrane, and a breast pump device are also provided. | 05-23-2013 |
20140255954 | METHOD OF BREAST CANCER DETECTION - Methods of diagnosing breast cancers are provided. The methods include analyzing the expression patterns of biomarkers in a plurality of cells to distinguish between invasive and non-invasive cancers, usual and atypical hyperplasias, and basal-like breast cancers. Breast cancers are diagnosed based upon different combinations of the biomarkers found in nipple aspirate fluid. | 09-11-2014 |
20140287430 | ABSORBENT PAPER AND USE THEREOF FOR BREAST CANCER DETECTION - Biological samples of mammary fluid or components thereof are obtained using a breast pump device coupled with an absorbent paper or membrane, optionally facilitated by administering oxytocin to the subject. The breast pump device stimulates expression of mammary fluid and provides for collection of diagnostic samples on the absorbent paper or membrane to evaluate breast disease, including cancer. The biological sample may include fluid containing one or more of cells or cellular components, proteins, glycoproteins, peptides, nucleotides or other desired constituents comprising a breast disease marker. Absorbent paper or membrane, and methods relating to the paper or membrane, and a breast pump device are also provided. | 09-25-2014 |
20150065362 | DYNAMIC METHODS FOR DIAGNOSIS AND PROGNOSIS OF CANCER - Disclosed herein are computer-based systems, media and methods of generating dynamic classifiers and uses thereof. The dynamic classifiers may be generated from a subset of cases and/or a subset of genes that have a molecular similarity to a subject suffering from a cancer. Thus, the dynamic classifiers may be subject-specific. The dynamic classifiers may be used in the diagnosis, prognosis and/or monitoring of a status or outcome of a cancer in a subject in need thereof. | 03-05-2015 |
20150323537 | ABSORBENT PAPER AND USE THEREOF FOR BREAST CANCER DETECTION - Biological samples of mammary fluid or components thereof are obtained using a breast pump device coupled with an absorbent paper or membrane, optionally facilitated by administering oxytocin to the subject. The breast pump device stimulates expression of mammary fluid and provides for collection of diagnostic samples on the absorbent paper or membrane to evaluate breast disease, including cancer. The biological sample may include fluid containing one or more of cells or cellular components, proteins, glycoproteins, peptides, nucleotides or other desired constituents comprising a breast disease marker. Absorbent paper or membrane, and methods relating to the paper or membrane, and a breast pump device are also provided. | 11-12-2015 |
Patent application number | Description | Published |
20140146039 | SELF-DISCLOSING CONTROL POINTS - A smart object represents a 3D graphics object whose control points are disclosed to a user. The control points are displayed for a user to use in performing simple and complex transformations on the 3D graphics object. The control points are positioned in areas where transformations are more likely to be made by a user. A transformation may be an action along one or more axes of the object, such as, rotation, scaling, and translation. The user may utilize the control points to perform a series of transformations that create a particular 3D graphics object without requiring expertise in the 3D graphics modeling application. | 05-29-2014 |
20140149944 | DIRECT MANIPULATION USER INTERFACE FOR SMART OBJECTS - A direct manipulation user interface provides a user with a means to interact with control points associated with smart objects to create and modify complex 3D graphic objects. The direct manipulation user interface includes a precision control mechanism that enables a user to specify precise measurements for a transformation through the user's interaction with a control point. The direct manipulation user interface also includes a history bar that enables a user to scroll back to a previous stage in the design process and to undo a sequence of transformations through the user's interaction with the history bar. | 05-29-2014 |
20150135308 | CORRELATED DISPLAY OF BIOMETRIC IDENTITY, FEEDBACK AND USER INTERACTION STATE - Aspects of the subject disclosure are directed towards providing feedback to users of multi-user system that has biometric recognition capabilities, so that a user knows whether the system has correctly associated the user with his or her identity. The feedback may include a display of a current camera view, along with visible identity information that is associated with each user in the view. The feedback may include per-user icons (e.g., tiles, thumbnail images and so on) by which a user visually confirms that he or she is correctly recognized. Any misrecognition may be detected via the feedback and corrected. Feedback may convey other information, such as the current interaction state/capabilities of a user. | 05-14-2015 |
20150138203 | VISUALIZING LARGE GRAPHS - Large graph visualization embodiments are presented which generally render and display the more important elements for a current view. To this end, a measure of importance referred to as a zoom level is assigned to the vertices and rails of a graph. Each rail is a curve segment in the graph that represents an edge or a set of edges passing through it. The rendering and displaying of a graph (or a part thereof) is done quickly, even as a user moves about the graph, and the visualization of the large graph is not so dense and so full of detail that the user becomes disoriented. In general, this is accomplished by specifying a current viewport, or a current zoom level, or both. Furthermore, the visualization is stable in that the layout of vertices and rails will be the same for the same zoom level and viewport. | 05-21-2015 |
Patent application number | Description | Published |
20140133645 | Method And Apparatus For Network-Intelligence-Determined Identity Or Persona - A method and apparatus is presented for enabling an agent to assume the identity or persona of a called party and process calls directed to the called party. In one embodiment, methods, which enable an agent to assume the identity or persona of a called party, and process calls directed to the called party are considered a call center functions and may be implemented in a call center. A call is initiated to a called party. Initiating the call generates called party information. Using the called party information a server retrieves information associated with the called party and then forward the information associated with the called party to an agent. The call is then forwarded to the agent. As a result, the agent may use the information associated with the called party to assume the identity or persona of the called party when responding to the call. | 05-15-2014 |
20140185431 | Multiple Media Fail-Over To Alternate Media - The present invention is a system and method for failing over from a current network access medium to an alternative network access medium. A customer premises equipment (CPE) box has ports for connections to a network through several network access media, such as high speed cable connections, DSL connections and dial-up connections. QoS parameters for each of the connections are monitored from a bandwidth manager remote from the CPE box. When it is determined that a fail-over would be beneficial, a message is sent from the bandwidth manager to the CPE box containing a command to fail-over and an identity of the alternate network access media. | 07-03-2014 |
20150071423 | Method And Apparatus For Network-Intelligence-Determined Identity Or Persona - A method and apparatus is presented for enabling an agent to assume the identity or persona of a called party and process calls directed to the called party. In one embodiment, methods, which enable an agent to assume the identity or persona of a called party, and process calls directed to the called party are considered a call center functions and may be implemented in a call center. A call is initiated to a called party. Initiating the call generates called party information. Using the called party information a server retrieves information associated with the called party and then forward the information associated with the called party to an agent. The call is then forwarded to the agent. As a result, the agent may use the information associated with the called party to assume the identity or persona of the called party when responding to the call. | 03-12-2015 |
20160119479 | Method And Apparatus For Network-Intelligence-Determined Identity Or Persona - A method and apparatus is presented for enabling an agent to assume the identity or persona of a called party and process calls directed to the called party. In one embodiment, methods, which enable an agent to assume the identity or persona of a called party, and process calls directed to the called party are considered a call center functions and may be implemented in a call center. A call is initiated to a called party. Initiating the call generates called party information. Using the called party information a server retrieves information associated with the called party and then forward the information associated with the called party to an agent. The call is then forwarded to the agent. As a result, the agent may use the information associated with the called party to assume the identity or persona of the called party when responding to the call. | 04-28-2016 |
Patent application number | Description | Published |
20080226297 | Optical Fiber Paper Reader - Techniques for authenticating certificates of authenticity (COAs) are discussed. The techniques provide for a simplified authentication system that is easily utilized in a field setting. In described embodiments, COAs are attached to or otherwise associated with goods to be authenticated. The COAs incorporate random or pseudo-random arrangements of optically sensitive fibers to create unique identifiers. A COA reader device optically scans each COA and characterizes the COA according to its unique arrangement of optical activity. A COA reader device may also scan data (e.g., a barcode) that is associated with the COA. The data contains information about the COA to further strengthen the COA authentication process. Based on the scan, the goods associated with the COAs can be verified as genuine (i.e., not pirated). | 09-18-2008 |
20090068982 | MOBILE WALLET AND DIGITAL PAYMENT - The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card), wherein the m-card is created by establishing a link to an account associated with a form of currency. The mobile device can employ public-key cryptography (PKC) to securely and wirelessly transmit a payment to the terminal component utilizing the m-card and linked account. | 03-12-2009 |
20090119215 | SECURE E-PAYMENTS - Systems and methods that supply a fair transaction when a user (e.g., buyer) obtains digital content that is ordered from a merchant. A trusted component associated with a device of a user can compute a cryptographic hash value for the digital content (e.g., during a download thereof), wherein such hash value cannot be altered (e.g., tampered) by the user. Accordingly, the subject innovation implements a trusted agent on a user's device, wherein such agent itself can further be downloaded to the user device as part of the transaction. | 05-07-2009 |
20100030695 | MOBILE DEVICE SECURITY USING WEARABLE SECURITY TOKENS - The claimed subject matter provides systems and/or methods that effectuates and establishes mobile device security. The system can include devices that detect point of sale mechanisms or secure token devices and based at least in part on the detection of secure token devices the system effectuates release of electronic funds persisted on a mobile device in order to satisfy a debt accrued at the point of sale mechanism. | 02-04-2010 |
20100044438 | Counterfeit and Tamper Resistant Labels with Randomly Occurring Features - Techniques are disclosed to enable utilization of randomly-occurring features of a label (whether embedded or naturally inherent) to provide counterfeit-resistant and/or tamper-resistant labels. More specifically, labels including randomly-occurring features are scanned to determine the labels' features. The information from the scan is utilized to provide identifying indicia which uniquely identifies each label and may be later verified against the label features that are present to determine whether the label is genuine. In a described implementation, the identifying indicia may be cryptographically signed. | 02-25-2010 |
20100091995 | SIMPLE PROTOCOL FOR TANGIBLE SECURITY - The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes. | 04-15-2010 |
20120023026 | MOBILE WALLET AND DIGITAL PAYMENT - The claimed subject matter provides a system and/or a method that facilitates securing a wireless digital transaction. A terminal component can receive a portion of data related to a payment for at least one of a good or a service. A mobile device can include at least one mobile payment card (m-card), wherein the m-card is created by establishing a link to an account associated with a form of currency. The mobile device can employ public-key cryptography (PKC) to securely and wirelessly transmit a payment to the terminal component utilizing the m-card and linked account. | 01-26-2012 |
20150186876 | MOBILE DEVICE SECURITY USING WEARABLE SECURITY TOKENS - The claimed subject matter provides systems and/or methods that effectuates and establishes mobile device security. The system can include devices that detect point of sale mechanisms or secure token devices and based at least in part on the detection of secure token devices the system effectuates release of electronic funds persisted on a mobile device in order to satisfy a debt accrued at the point of sale mechanism. | 07-02-2015 |
20160065544 | Simple protocol for tangible security - The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes. | 03-03-2016 |