Patent application number | Description | Published |
20100191582 | USER INTERFACE AND METHODS FOR RECOMMENDING ITEMS TO USERS - An improved user interfaces and methods are provided for presenting item recommendations to a user when the user selects an item to add to a shopping cart. In response to the user's selection, a page generation process generates and returns a page that includes a plurality of recommendations sections, each of which displays item recommendations generated using a different respective recommendation or selection algorithm (e.g., recommendations based on shopping cart contents, recommendations based on purchase history, etc.). These recommendation algorithms may be selected based on collected information regarding the user. The page may also include a shopping cart section which displays contents of the shopping cart. | 07-29-2010 |
20100191619 | USER INTERFACE AND METHODS FOR RECOMMENDING ITEMS TO USERS - Improved user interfaces and methods are provided for presenting item recommendations to a user when the user selects an item to add to an electronic shopping cart. In response to the user's selection, a page generation process generates and returns a page that includes a condensed shopping cart portion and a recommendations portion. The condensed shopping cart portion displays the contents of the shopping cart, but omits some of the item information and/or controls provided on a shopping cart page, thereby preserving more screen real estate for the display of item recommendations. The condensed shopping cart portion also includes a link to the shopping cart page. | 07-29-2010 |
20130097052 | USER INTERFACE AND METHODS FOR RECOMMENDING ITEMS TO USERS - Improved user interfaces and methods are provided for presenting item recommendations to a user when the user selects an item to add to an electronic shopping cart. In response to the user's selection, a page generation process generates and returns a page that includes a condensed shopping cart portion and a recommendations portion. The condensed shopping cart portion may include a link to an additional page that includes controls for editing the shopping cart and/or includes additional information regarding contents of the shopping cart. The recommendations portion may include multiple recommendations sections that are populated using different respective item selection methods. | 04-18-2013 |
Patent application number | Description | Published |
20120035990 | SYSTEM AND METHOD FOR REWARDING APPLICATION INSTALLS - In a system and method for monitoring application installations, a reference to download an application is transmitted to a client device. Communication between the client device and an application server providing the application downloadable by the client device is facilitated. Execution of the application by the client device is detected, and a determination of the installation history of the application on the client device is performed. Reward data is associated with the client device for a first installation of the application on the client device. | 02-09-2012 |
20130211942 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from a sender, the gift request specifying a recipient and a gift item; requesting approval of the gift item from the recipient; posting a notification of the gift item for publication by an online social network in response to approval of the gift item by the recipient; and initiating payment for the gift item, on behalf of the sender, in response to approval of the gift item by the recipient. | 08-15-2013 |
20130211943 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from each of a plurality of senders, each gift request specifying a recipient and a selected gift item; requesting approval of each gift item from a respective recipient; posting a notification of each gift item for publication by an online social network in response to approval of each gift item by a respective recipient; initiating payment for each gift item, by a respective sender, in response to approval of each gift item by a respective recipient; tracking approval and modification of each gift item by a respective recipient; and generating a trend report of gift customization based upon a characteristic of recipients who modify and accept gift items specified by respective senders. | 08-15-2013 |
20130211949 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: receiving a gift request from a sender, the gift request specifying a recipient and an initial order for a gift item of a predefined price; modifying the initial gift order according to a customization input from the recipient; requesting approval of the modified gift order from the recipient; posting a notification of the modified gift order for publication by an online social network in response to approval of the modified gift order by the recipient; and in response to approval of the modified gift order by the recipient, initiating fulfillment of the modified gift order by requesting payment from the sender up to the predefined price of the gift item specified in the gift request and according to the customization input from the recipient. | 08-15-2013 |
20130211954 | METHOD FOR ENABLING A GIFT TRANSACTION - A method of an embodiment includes: accessing a list of gift items previously selected for a recipient by previous senders, the list comprising a first gift item previously selected by a first sender; receiving a gift request from a second sender, the gift request specifying the recipient and a second gift item; identifying a complementary relationship between the first gift item and the second gift item; requesting approval, from the recipient, of an aggregated gift item that is a combination of the first gift item and the second gift item; posting a notification of the aggregated gift item for publication by an online social network in response to approval of the aggregated gift item by the recipient; and initiating payment of the second gift item by the second sender in response to approval of the aggregated gift item by the recipient. | 08-15-2013 |
20130332307 | METHOD FOR NOTIFYING A SENDER OF A GIFTING EVENT - One variation of the method includes: within a set of communications from a set of users and directed to a recipient within a social networking system, identifying indicators of a gift-appropriate event of the recipient; selecting a gift for the recipient in response to a threshold number of communications with an identified indicator of the gift-appropriate event; selecting a sender, outside the set of users, based on a determined relationship between the sender and the recipient; transmitting an electronic notification to the sender, the electronic notification including an recommendation for the gift for the recipient; and modifying the recommendation in response to an update event following transmission of the electronic notification to the sender and prior to purchase of the gift, by the sender, for the recipient. | 12-12-2013 |
20130332308 | METHOD FOR RECOMMENDING A GIFT TO A SENDER - One variation of the method includes: receiving a set of communications from multiple users, the set of communications directed to a recipient through a social networking system; identifying a gift-appropriate event of the recipient based on the set of communications; determining an intent of a sender to respond to the gift-appropriate event of the recipient based on an incomplete electronic note drafted by the sender, within the social networking system, and designating the recipient; selecting a gift for the recipient in response to the determined intent of the sender; and prior to transmission of the note to the recipient, displaying a recommendation to the sender, the recommendation including a suggestion to purchase the gift for the recipient. | 12-12-2013 |
20150106263 | METHODS AND SYSTEMS FOR DYNAMICALLY PROCESSING CARD PAYMENT AUTHORIZATION REQUESTS - Exemplary methods and systems for dynamically processing payment authorization requests for gift card purchases. An exemplary method includes maintaining information associated with a gift card, receiving a payment authorization request for the gift card from a particular merchant, detecting a trigger associated with the received payment authorization request, and sending, based on the detected trigger, a response to the payment authorization request. Corresponding methods and systems are also disclosed. | 04-16-2015 |
Patent application number | Description | Published |
20130297493 | METHOD FOR ENABLING GIFT PREPAY - A variation of the invention is a method that: based on an action of a recipient stored in a social networking system, identifies recipient interest in a product; based on an association between the recipient and a sender stored in the social networking system, prompts the sender to supply a fund to be applied to a purchase of the product by the recipient; requests a financial account identifier from the recipient; identifies recipient initiation of a purchase of the product from the merchant based on a financial account identifier collected, by the merchant, from the recipient; adjusts a purchase price of the product for the recipient, prior to completion of purchase, to reflect the fund supplied by the sender; generates a notification indicating purchase of the product by the recipient; and initiates transfer of the fund to the merchant in response to recipient purchase of the product. | 11-07-2013 |
20140214626 | METHODS FOR ENABLING GIFT CARD TRANSACTIONS - One variation of the first method includes: receiving a first gift order from a first sender through a social networking system, the first gift order specifying a recipient, a first merchant, and a first monetary value redeemable through the first merchant; issuing a tangible gift card to the recipient, the gift card linked to a gift account, of the recipient, within the social networking system; receiving a second gift order from a second sender through the social networking system, the second gift order specifying the recipient, a second merchant, and a second monetary value redeemable through the second merchant; linking the first and second monetary values to the gift account; and, in response to a first purchase from the first merchant with the gift card, publishing a detail of the first purchase to a feed within the social networking system in accordance with a privacy setting of the recipient. | 07-31-2014 |
20150052070 | TECHNIQUES TO PROMOTE MESSAGES - Techniques to promote messages in a social networking services to increase communication opportunities while throttling unsolicited messages are described. In one embodiment, an apparatus may have a message generation component and a message delivery component. The message generation component may be operative to receive a request from a first member of a social networking service (SNS) to send a message for a second member of the SNS. The message delivery component may be operative to deliver the message to one of multiple mailboxes for the second member based on a tiered payment schedule. The tiered payment schedule may include a first parameter to represent a relationship type between the first and second members, a second parameter to represent a subscriber tier for the second member, and a third parameter to represent a promotional cost associated with the subscriber tier. Other embodiments are described and claimed. | 02-19-2015 |
Patent application number | Description | Published |
20150100458 | SYSTEMS AND METHODS FOR USING A SOCIAL NETWORKING SYSTEM TO PURCHASE PRODUCTS - Embodiments of the present invention relate generally to marketing products through a social networking system. More specifically, one or more embodiments of the present invention relate to allowing social networking users to purchase products through the social networking system and to add products to shopping carts associated with third-party merchants. | 04-09-2015 |
20150100459 | SYSTEMS AND METHODS FOR USING A SOCIAL NETWORKING SYSTEM TO ADD PRODUCTS TO SHOPPING CARTS OF THIRD-PARTY MERCHANTS - Embodiments of the present invention relate generally to marketing products through a social networking system. More specifically, one or more embodiments of the present invention relate to allowing social networking users to purchase products through the social networking system and to add products to shopping carts associated with third-party merchants. | 04-09-2015 |
20150149353 | METHODS AND SYSTEMS FOR OBTAINING MERCHANT IDENTIFICATION WITHIN PAYMENT AUTHORIZATION NETWORKS - Exemplary methods and systems for enabling a multi-merchant gift card program are disclosed. In particular, the present application details exemplary methods and systems for obtaining merchant identification information associated with a merchant. Upon obtaining the merchant identification for a merchant, the present application further details exemplary methods and systems for enabling a gift card services for the merchant. | 05-28-2015 |
20160048880 | EXPANDED TRACKING AND ADVERTISING TARGETING OF SOCIAL NETWORKING USERS - The present disclosure relates, in part, to an advertisement system that provides for the augmentation of social networking profiles with information derived from user activity associated with third-party content outside of a social networking system. The augmented profiles of users may be analyzed and compared to identify targeted advertisement opportunities for one or more users. The advertisement system can analyze the augmented profiles of one or more users to identify look-alike product advertisement opportunities, look-alike user advertisement opportunities, as well as various remarketing, reminders, and cross-device marketing opportunities. | 02-18-2016 |
Patent application number | Description | Published |
20100162036 | Self-Monitoring Cluster of Network Security Devices - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 06-24-2010 |
20100162383 | Cluster Architecture for Network Security Processing - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 06-24-2010 |
20100169446 | Cluster Architecture and Configuration for Network Security Devices - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 07-01-2010 |
20100191837 | LOCATION-AWARE CONFIGURATION - A networking device may operate according to a first configuration profile adapted to cause the device to conform to restrictions applicable within a plurality of different locations. The networking device may obtain a second, location-aware configuration profile, which may include restrictions applicable to the location where the device is deployed. The second, location-aware configuration profile may be provided by a location-aware configuration service responsive to a request from the device. The service may determine a location of the device from the request. The service may identify restrictions applicable within the region the device is located. | 07-29-2010 |
20130173766 | CLUSTER ARCHITECTURE AND CONFIGURATION FOR NETWORK SECURITY DEVICES - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 07-04-2013 |
20130191881 | CLUSTER ARCHITECTURE FOR NETWORK SECURITY PROCESSING - A computing device may be joined to a cluster by discovering the device, determining whether the device is eligible to join the cluster, configuring the device, and assigning the device a cluster role. A device may be assigned to act as a cluster master, backup master, active device, standby device, or another role. The cluster master may be configured to assign tasks, such as network flow processing to the cluster devices. The cluster master and backup master may maintain global, run-time synchronization data pertaining to each of the network flows, shared resources, cluster configuration, and the like. The devices within the cluster may monitor one another. Monitoring may include transmitting status messages comprising indicators of device health to the other devices in the cluster. In the event a device satisfies failover conditions, a failover operation to replace the device with another standby device, may be performed. | 07-25-2013 |
20140059188 | LOCATION-AWARE CONFIGURATION - A networking device may operate according to a first configuration profile adapted to cause the device to conform to restrictions applicable within a plurality of different locations. The networking device may obtain a second, location-aware configuration profile, which may include restrictions applicable to the location where the device is deployed. The second, location-aware configuration profile may be provided by a location-aware configuration service responsive to a request from the device. The service may determine a location of the device from the request. The service may identify restrictions applicable within the region the device is located. | 02-27-2014 |