Patent application number | Description | Published |
20090276302 | Advertising revenue sharing - A method for compensating all parties involved in producing the income stream for a content distributor is presented where the content-hosting site, the content writer and the user doing the interaction with paid contents receive a fair share of the generated income stream. | 11-05-2009 |
20100198928 | Virtual email method for preventing delivery of unsolicited and undesired electronic messages - A method is used to filter an electronic message using virtual email sent to a server using a virtual email address created by the server for a recipient-identified. The virtual email address comprises a sender identification in combination with the recipient's non-encoded email address. The server identifies the email recipient using the recipient's non-encoded email address, identifies the email sender as authorized, stores the email sender's identification, stores email comprising the virtual email address; enables the recipient to access the email; enables the recipient to create a virtual email address, receives the virtual email; receives a second electronic message from a non-user-identified sender at the server, responds to the non-user-identified sender requesting an answer that only a human could provide; and, receives the answer from the non-user-identified sender and if the answer is correct, then creates an electronic account on the server for the non-user-identified. | 08-05-2010 |
20100202606 | Two strings private key (symmetric) encryption and decryption method - Two strings encryption algorithm where a long and a short string are used. The byte values of the short string points to a location of the long string and the plaintext is aligned with the long string's location and encryption is performed using the long string's byte values and the plaintext the process is repeated for all bytes of the short string pointing to the long string and aligned a byte to encrypt with the long string. | 08-12-2010 |
20100223290 | Method of using a code to track user access to content - A method for tracking user internet surfing involving steps of providing a computer hosting a plurality of contents stored on a computer storage medium; storing on the computer storage medium a surf code reference for each content in the plurality of contents; storing on the computer storage medium an identification of the user to enable the user to log in to the computer; enabling a logged-in user to access the computer through the requesting client to view a content in the plurality of contents; maintaining a user list comprising the surf-code reference of the content viewed by the logged-in user; enabling the logged-in user to access the user list to identify the content viewed by the logged-in user; and, presenting the content viewed by the logged-in user to the requesting client based on the user list. | 09-02-2010 |
20100281041 | Target advertising to a specific user offered through an intermediary internet service provider, server or wireless network - An advertising method controls the display of information on a client device. A user accesses first content on a server and a first link reference to second content is created. The first content and the first link reference are displayed in separate areas. User interaction with the first link reference sends second content to replace the first content on the content display area of the client computer. The second content includes a second link reference which can redirect the user to the hosting location of the second content. The server may operate as a wireless node. The first content is optionally parsed to key words or objects and the parsed content is used to identify the second content. Optionally, receiving data from a user's wireless device relates to user location; and, the location data is used to identify the second content. | 11-04-2010 |
20110026711 | Asymmetric cryptography using shadow numbers - A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used with two or more base values with a two side equation, on one side the value to encipher is multiplied with one of the shadow value then the modulus taken with the base value, to decipher the enciphered value is multiplied with the shadow value that didn't take part of the first equation then the modulus is taken with the base value, thus, deciphering the enciphered value. | 02-03-2011 |
20110225243 | Method for global resources sharing, logically linked means and integrated functionality for solutions building - A method is disclosed for enabling sharing of software using logic links. Software may be an application or other code. Sharing occurs at runtime of a solution or an application. A first registered user uploads an application, an application page, and an application parameter which may then be used and shared with other users. User action seeking to share an application is done by the user selecting a logic link to the software. A second user adds a logic link in a solution that directs the integration of software sought to be shared. Thereafter, the second user may run the second solution with the application. | 09-15-2011 |
20110238501 | Advertising revenue sharing - A method of host development is based on paying the writer of free content through advertising revenue sharing. Steps include receiving an advertisement, which is paid content, from an advertiser; receiving non-paid content subject to a condition that the provider may receive no compensation for the non-paid content; combining the paid content and the non-paid content on a content page; registering a user to interact with the content page; sending the content page for display on a computer operated by the user; calculating a number equaling all interactions of the user with the paid content; receiving payment from the advertiser for said number; and paying the provider based on a fraction of the payment. | 09-29-2011 |
20110320315 | Method of using a code to track user access to content - A method for tracking user internet surfing involving steps of providing a computer hosting a plurality of contents stored on a computer storage medium; storing on the computer storage medium a surf code reference for each content in the plurality of contents; storing on the computer storage medium an identification of the user to enable the user to log in to the computer; enabling a logged-in user to access the computer through the requesting client to view a content in the plurality of contents; maintaining a user list comprising the surf-code reference of the content viewed by the logged-in user; enabling the logged-in user to access the user list to identify the content viewed by the logged-in user; and, presenting the content viewed by the logged-in user to the requesting client based on the user list. | 12-29-2011 |
20120022976 | Method for creating and maintaining worldwide e-commerce - A virtual network resource infrastructure for hosting and managing a plurality of e-malls and each e-mall uses the virtual network resource infrastructure for offering e-commerce solution and the hosting of: e-shops, e-distributors and web sites. Also, on-line foreign language interface translation and interface exchange. Further having satellite e-malls with e-services and e-mall using satellite e-malls' e-services; user surfing tracking means and multiple sales channel where e-shops, e-malls, satellite e-malls and e-distributors sell their products directly or cross-sell each others products. | 01-26-2012 |
20120158875 | Assigning an Internet domain to a user as the user registers with a server - A method wherein a server computer assigns a domain to a user, and uses direct domain to domain content transfers, and not web-based linking, to enable a first user's content to be directly associated with a second user's content. Steps include registering and assigning a first user identification to the first user requesting registration; assigning a first domain to the first registered user; receiving a second request from a second user to register with the server computer; registering the second user; assigning a second domain to the second registered user; managing the assigned first domain by assigning a first content provided by the first user to the first domain; managing the assigned second domain by assigning a second user provide second content to the second domain; receiving a request from a client for the first content at the first domain; and fetching and returning the first content from the first domain and the second content from the second domain to the client, wherein fetching and returning is performed by the server computer without using web-based linking. | 06-21-2012 |
20120317222 | Virtual email method for preventing delivery of undesired electronic messages - A method is used to filter an electronic message using virtual email sent to a server using a virtual email address created by the server for a recipient-identified. The virtual email address comprises a sender identification in combination with the recipient's non-encoded email address. The server identifies the email recipient using the recipient's non-encoded email address, identifies the email sender as authorized, stores the email sender's identification, stores email comprising the virtual email address; enables the recipient to access the email; enables the recipient to create a virtual email address, receives the virtual email; receives a second electronic message from a non-user-identified sender at the server, responds to the non-user-identified sender requesting an answer that only a human could provide; and, receives the answer from the non-user-identified sender and if the answer is correct, then creates an electronic account on the server for the non-user-identified. | 12-13-2012 |
20130159474 | Target advertising using wireless node location-based data - A method for targeting advertisings to users through a wireless node by supplying requested content plus related content based on wireless location data and optionally based on user profile information, with previously viewed content, and with user surfing history. | 06-20-2013 |
20140074993 | Method enabling the presentation of two or more contents interposed on the same digital stream - A method enables the presentation of two or more contents interposed on the same digital stream to a user at a remote client computer. Steps include: storing a digital content consisting of a first digital-stream content; a second digital-stream content; or a third digital-stream content where the third digital-stream content is the first digital-stream content and the second digital-stream content; storing secondary-data where the secondary-data is one of a code usable at the client computer to launch the digital content and code usable at the client computer to launch related content; transmitting the digital content and the secondary-data to the client computer; presenting the digital content to the user for display; when the third digital-stream is transmitted as digital content to the client computer, then presenting the third digital-stream content in an order; and, launching the related content in a display location-area different than any display location-area. | 03-13-2014 |
20140108509 | Assigning an Internet domain to a user as the user registers with a server - A method employing a server computer to assign domains to users, and store contents or user's registration data from the domains in a single database shared by all the assigned domains. Steps include: registering and assigning a first user identification; assigning a first domain to a first registered user; receiving a second request from a second user to register; registering the second user; assigning a second domain to the second registered user; managing the assigned first domain by assigning a first content and storing the first content on the database; managing the assigned second domain by assigning a second content to the second domain and storing the second content on the database; receiving a request from a client for the first content at the first domain; and fetching and returning the first content from the database. | 04-17-2014 |
20140192965 | Method for blocking illegal prerecord messages (robocalls) - A method uses telephone number lists and a telephone exchange server to enable the blocking of illegal robocalls (prerecorded messages) and to enable the legal ones to proceed free of impediment. The method includes steps of providing a server computer; receiving at the server computer a first telephone number of a first telephone monitored by a first recipient; receiving permission from the first recipient to permit sending a telephone call to the first telephone when the telephone call originates from a second telephone number; storing the first telephone number and the second telephone number; intercepting a call to the first telephone number; determining an originating telephone number for a device making the intercepted call; and comparing the originating telephone number to the telephone number list and if the originating telephone number is in the telephone number list, then the server computer enabling the call to ring at the first telephone. | 07-10-2014 |
Patent application number | Description | Published |
20080201216 | Target advertising to a specific user offered through an intermediary ISP, Server or Wireless Network - A method for targeting advertisings to users through an ISP by supplying related content to the user visited webpage, websites, user profile, previously viewed content, user surfing history and wireless node's demography data. Furthermore, an Indexing Server working in harmony with the ISP as to provided related contents to the user and based on user's previously viewed contents, user's surfing history and user's profile. As well, a wireless node having means to provide to a user additional contents and based on the wireless node's contents choice. | 08-21-2008 |
20080201235 | Advertising revenue sharing - A method for compensating all parties involved in producing the income stream for a content distributor is presented where the content-hosting site, the content writer and the user doing the interaction with paid contents receive a fair share of the generated income stream. | 08-21-2008 |
20080219448 | Multiple-layers encryption/decryption and distribution of copyrighted contents - A method and an apparatus for providing multiple-layers of encryption/decryption of contents and the transferring of protected content between devices based on each device's multiple IDs. Furthermore, it related to a two-way secure communication between two or more devices. The encryption/decryption is based on a common content ID that is used for providing multiple layers of encryption that can be used by hardware and software. Each byte of the digital stream is XORed with each byte of the content ID thus providing the encryption strength. The same process is applied to the encrypted content (ciphertext) thus reproducing the plaintext. As well, means for encrypting/decrypting digital content using its plain byte values as part of the content private key's registers. | 09-11-2008 |
20080260153 | Symmetric and asymmetric cryptography using shadow numbers - A method and an apparatus for enciphering and deciphering content with symmetric and asymmetric cryptography with the use of the shadow numbering system where two or more shadow values are used with two or more base values with a two side equation, on one side the value to encipher is multiplied with one of the shadow value then the modulus taken with the base value, to decipher the enciphered value is multiplied with the shadow value that didn't take part of the first equation then the modulus is taken with the base value, thus, deciphering the enciphered value. | 10-23-2008 |