Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

5367results about How to "Good service" patented technology

Advertising with video ad creatives

The serving of advertisements with (e.g., on) video documents may be improved in a number of ways. For example, a system may (a) accept information defining at least one ad spot associated with at least one instance of an video document, (b) accept offers to have advertisements served in the ad spot(s), and (c) arbitrate among competing advertisements, using at least the offers, to determine at least one advertisement to be served in that ad spot(s). As another example, a system may (a) accept relevance information for an advertisement, (b) determine at least one video document using the accepted relevance information, (c) present information about the video document(s) to an advertiser associated with the advertisement, and (d) accept, from the advertiser, an offer to have its advertisement served with at least one of the video document(s) accepted. As yet another example, a system may (a) accept relevance information for an video document, (b) determine a plurality of advertisements relevant to the video document using the relevance information and serving constraints of the advertisements, and (c) select at least one of the determined relevant advertisements to be served with the video document. Examples of video documents include video files published on the Internet, television programs, live or recorded talk shows, video-voice mail, segments of an video conversation, etc.
Owner:GOOGLE LLC

Methods and systems for provisioning mobile devices with payment credentials

Embodiments are described that are directed to optimizing the provisioning of payment account credentials to mobile devices utilizing mobile wallets. In some embodiments, one of multiple provisioning schemes may be selectively chosen for payment account credential provisioning based upon a determined risk involved with a particular provisioning request. A low risk provisioning request leads to an immediate provisioning of a payment credential, whereas a provisioning request of high risk results in the provisioning request being denied. In some embodiments, medium risk provisioning requests will cause an additional user authentication to be performed before the payment account provisioning is finalized. The additional user authentication may occur using a separate communication channel than the channel in which the provisioning request was received.
Owner:VISA INT SERVICE ASSOC

System and method for integrated WiFi/WiMax neighbor AP discovery and AP advertisement

ActiveUS20070140163A1Facilitate loadingLightly loadNetwork traffic/resource managementAssess restrictionTelecommunicationsWiMAX
A system and method wherein mobile nodes scan both 802.16 and 802.11 radio channels for neighbor access points. A mobile node reports both WiMax and WiFi neighbor access points to its parent access point. A parent access point advertises both WiMax and WiFi neighbor access points to child mobile nodes to facilitate faster roaming and load balancing. A parent WiMax AP can direct a mobile node to roam to a neighbor WiFi access point that has a lighter load or offers enhanced services. As an option, a location tracking protocol is used to determine the location of a mobile node and the mobile node's parent AP advertises neighbor APs that offer services in the mobile node's location.
Owner:CISCO TECH INC

Optimizing Distributed Computer Networks

ActiveUS20120089664A1Uniform applicationIncrease flexibility and efficiency and accelerationMultiple digital computer combinationsProgram controlClient-sideNetwork service
In one general embodiment, a computer-implemented method for managing a distributed computer network performed by one or more processors includes the steps of: receiving a request from a client in the distributed computer network for a network service; optimizing a delivery of the requested network service to the client from a server in the distributed computer network; and monitoring an execution of the delivery of the network service.
Owner:SAP PORTALS ISRAEL

Business rating placement heuristic

A system and method for distributing information (collectively the “system”) is disclosed. The system includes category-based, geography-based, and ratings-based attributes to better “focus” the information distributed by the system. In the processing of listing-based attributes (e.g. attributes limited to a particular listing), the system can also be influenced by relationship-based attributes (e.g. attributes between the administrator of the system and the advertisers, and even potentially users).
Owner:THRYV INC

Assessment of best fit cloud deployment infrastructures

A system configured to facilitate selling hybrid cloud services comprises a plurality of user interface structures each coupled to an information processor. A first user interface structure is configured to request information characterizing deployment of an application within a current operational infrastructure. A second user interface structure is configured to display a recommended deployment infrastructure supporting migration of the application thereto. A third user interface structure is configured to display information characterizing migration of the application to the recommended deployment infrastructure. The information processor is configured to receive the current application deployment characterizing information from the first user interface structure, to determine the recommended deployment infrastructure using at least a portion of the current application deployment characterizing information, and to determine the information characterizing migration of the application to the recommended deployment infrastructure using at least a portion of the current application deployment.
Owner:HCL TECH LTD

Automated meter reading system, communication and control network from automated meter reading, meter data collector, and associated methods

An automated meter reading network system to collect utility usage data from multiple utility meters having utility meter sensors, program product, and associated methods are provided. The system includes multiple meter data collectors each in communication with one or more utility meters to collect utility usage data and forming a wireless communications network. The system also includes a host computer in communication with the meter data collectors either directly or through multiple field host data collectors which can be connected to the host computer through a wide area network. The system also includes a meter data collector program product at least partially stored in the memory of the host computer to manage the communication network. The meter data collector program product is adapted to analyze signal strength between nodes and to dynamically adjust the power level settings of the individual nodes to enhance network performance.
Owner:ENERGY TECH GROUP

Method, system, and apparatus for managing, monitoring, auditing, cataloging, scoring, and improving vulnerability assessment tests, as well as automating retesting efforts and elements of tests

A scalable method, system, and apparatus for non-intrusively auditing and improving security assessments includes capturing, storing, presenting, displaying, inspecting, monitoring, and analyzing data flow in client-server security assessments and / or network / infrastructure security assessments. The invention provides interested parties with a mechanism to non-intrusively audit in real-time the vulnerability test effort, as well as review, replay, and analyze all aspects of the security assessment during and after the test. For web application assessments, the data capture includes one of the following or some combination: an intermediary with all data passing through the intermediary; a sniffer that can passively extract all data being communicated between the application and tester; and a plurality of computing modules (e.g., software, appliances, etc.) installed in the tester environment or within the application system environment (e.g., software installed on the tester's computer, or on the computer where the intermediary is running, or software installed on the application systems proxy or web server, or an appliance in either environment) for storing, processing, analyzing, reporting, and displaying the data.
Owner:STYSLINGER BRIAN

Method and apparatus for the automated delivery of notifications to contacts based on predicted work prioritization

ActiveUS20070071222A1Improved customer serviceImproved contact center effectivenessSpecial service for subscribersManual exchangesContact centerComputer science
In one embodiment, a contact center is provided that includes: (a) a work item queue 208, 250 comprising an intra-enterprise contact associated with at least first and second internal endpoints of an enterprise; and (b) a selector operable to select and assign a work item to an agent. In selecting the work item, the selector considers both a customer contact and the intra-enterprise contact. The intra-enterprise contact, for example, can be a training notification.
Owner:AVAYA INC

Extension of logical networks across layer 3 virtual private networks

A method of manages a set of managed forwarding elements that forward data between machines. The method configures (1) a first managed forwarding element to operate in a first network that uses first and second address spaces that at least partially overlap with each other, (2) a second managed forwarding element to operate in a second network that uses the first address space, and (3) a third managed forwarding element to operate in a third network that uses the second address space. A machine in the second network and a machine in the third network have an identical address that belongs to both the first and second address spaces. The method directs the first managed forwarding element to connect to the second and third managed forwarding elements in a manner that enables the first managed forwarding element to forward data from a machine in the first network to the machine in the second network via the second managed forwarding element.
Owner:NICIRA

Method and system for finding approximate matches in database

Entertainment content complementary to a musical recording is delivered to a user's computer by means of a computer network link. The user employs a browser to access the computer network. A plug-in for the browser is able to control an audio CD or other device for playing the musical recording. A script stored on the remote computer accessed over the network is downloaded. The script synchronizes the delivery of the complementary entertainment content with the play of the musical recording.
Owner:GRACENOTE

Advertising using extracted context sensitive information and data of interest from voice/audio transmissions and recordings

Method and apparatus that use voice / audio recognition and analysis technologies to deliver assigned context sensitive information and data of interest (keywords, phrases, mood, etc.). Context sensitive information and data of interest can be extracted from any voice / audio transmissions and voice / audio recordings (or any transmission or recording that includes voice / audio) for advertising purposes. This invention includes the said assigned context sensitive information and data of interest extraction method using voice / audio recognition and analysis technologies. Most importantly, this invention opens up new doors to advertising using extracted context sensitive information and data of interest from voice / audio transmissions and recordings (or any transmission that includes voice / audio).
Owner:LIU EDWARD

Intelligent automated agent for a contact center

InactiveUS20140314225A1Improve customer serviceGood and more personalized serviceCustomer relationshipSpecial service for subscribersContact centerData science
A system for handling customer interactions with a contact center for an enterprise includes an intelligent automated agent that includes a processor, a non-transitory storage device configured to store customer profile data, and a memory. The memory has instructions stored thereon that, when executed by the processor, causes the processor to: run an artificial intelligence engine configured to learn knowledge about a customer from past interactions between the contact center and the customer, and to apply the learned knowledge to future interactions; and maintain the customer profile data on the storage device. The maintaining of the customer profile data includes retrieving the customer profile data at a beginning of a new interaction, using the retrieved customer profile data to decide how to handle the new interaction, and updating the customer profile data after completion of the new interaction to reflect the new interaction as one of the past interactions.
Owner:GENESYS TELECOMMUNICATIONS LABORATORIES INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products