Patent application number | Description | Published |
20110307490 | Context Level Protocols And Interfaces - An invention for dissemination or retrieval of digital resources or online information via context layer or context-level protocols and interfaces is described. According to one embodiment, an interface or protocol that a computer uses to communicate with other computers is associated with a subject matter context. User-level contents or digital resources received across that interface or protocol are then associated with that subject matter context, and the computer may respond accordingly. For instance, a computer may associate a given network port with a subject matter context of shopping, and treat all digital resource requests received on that port as applying to only a shopping subject matter context. A web server may also listen on a network port associated with a subject matter context, thereby contextualizing the overall nature of the website that the web server hosts. | 12-15-2011 |
20120005215 | Resource Hubs For Heterogeneous Groups - An invention is disclosed for providing a digital resource gathering and dissemination system, method, or process that can accommodate digital resources of interest for heterogeneous groups and communities of online users for the same topic, demographic, or some other categories as provided by a particular classification scheme. Such a system, method, or process also provides a more reliable or otherwise representative selection of digital resources of interest to the population as a whole. | 01-05-2012 |
20120253943 | METHOD AND SYSTEM FOR ADVERTISING INFORMATION ITEMS - An invention is disclosed for an advertising system, method, or process that enables sellers to efficiently associate their advertisements with specific content, and presents these ads to consumers whose attention of interest corresponds to the content. Such a system, method, or process also provides a more reliable, accurate, or otherwise effective way of presenting relevant ads to consumers and affording sellers an effective advertising campaign. | 10-04-2012 |
20130110911 | Trust Network Effect | 05-02-2013 |
20130254314 | DIGITAL CONTENT DELIVERY - Methods and systems for automated retrieval of content embedded in or referred to in a message or request received in relation to a user account are provided. For instance, A UCM and/or a UCR may access a user account and retrieve a message from the account. The message may be then analyzed to extract information related to the content that may be included in the message. The content associated with the extracted information is accessed and retrieved. The retrieved content is presented to the user. | 09-26-2013 |
20140122369 | PROOF SUPPORTED REVIEW SYSTEM - An invention is disclosed for an information system, method, or process that, among its enabling features, collects, organizes, and disseminates review information from customers with proof of involvement or engagement, such as sales receipts. Such a system, method, or process also provides a more inclusive, reliable, or otherwise effective way of gathering reviews for product, service, and seller and communicating them with consumers. | 05-01-2014 |
20150026011 | OFFER REPORTING APPARATUS AND METHOD - A computerized method for storing purchase information for a product in a price database to generate a purchase history includes receiving in a price database a set of sales information for a product, wherein the set of sales information includes a product identifier for a product and a price for the product; and storing in the price database a price entry, which include the set of sales information, wherein the price entry is editable to generate a purchase history. | 01-22-2015 |
20150052582 | SECURE AREA FOR APPS - Privacy and restricted access are provided for functions, applications, and services on a computing device. An area accessible to a user interface is provided. A request from a user is accepted, the request for associating with the area with one or more available functions. The one or more functions are then associated with the area, and are made invisible. Another request from the user is accepted, the other request for gaining access to the area. Authentication against the user is requested. Access to the one or more functions is granted if the authentication is successful. According to another embodiment, an authorized user may send and receive messages via another device that belongs to another user based on identification of the user by the other user. | 02-19-2015 |