摘要:
Examples of the present invention include profiling systems that store, manage, and utilize profile information to take predictive or deterministic action. Embodiments of the invention allow the profiling system to be used as a trusted intermediary where the profile owning entity controls access to their profile information across their network of devices and services.
摘要:
Examples of the present invention include profiling systems that store, manage, and utilize profile information to take predictive or deterministic action. Embodiments of the invention allow the profiling system to be used as a trusted intermediary where the profile owning entity controls access to their profile information across their network of devices and services.
摘要:
Examples of the present invention include profiling systems that store, manage, and utilize profile information to take predictive or deterministic action. Embodiments of the invention allow the profiling system to be used as a trusted intermediary where the profile owning entity controls access to their profile information across their network of devices and services.
摘要:
Examples of the present invention include advertising selection and display systems that utilize electronic profiles and information received about one or more network accessible content items an entity accessed, such as a web page. The information and electronic profile is used to determine links, advertisements, or both, that may be displayed in a web browser or other viewer along with the accessed network content.
摘要:
Security and distributed storage is described for systems using electronic profile information. Embodiments may be utilized for ID, data, and access analysis. Dynamic distributed redundant encryption may be used that may be based on user, device, location, context information, physical, or environmental characteristics. In one implementation, encrypted electronic profiles are stored on behalf of users by a profiling system, allowing user information within the electronic profiles to be accessed only by decryption of a portion of the electronic profile by the profiling system using distributed decryption codes.
摘要:
Security and distributed storage is described for systems using electronic profile information. Embodiments may be utilized for ID, data, and access analysis. Dynamic distributed redundant encryption may be used that may be based on user, device, location, context information, physical, or environmental characteristics.
摘要:
Examples of the present invention include profiling systems that store, manage and respond to electronic profiles. The profiling systems utilize attributes of the electronic profiles to take predictive or deterministic action, including identifying content to be provided and notification of selected content. Embodiments of the invention allow the profiling system to be used as a trusted intermediary where the profile owning entity controls access to their electronic profiles across their network of devices and services.
摘要:
Techniques are described for determining and using relevant information related to domains of interest. In at least some situations, the techniques include automatically analyzing documents, terms and other information related to a domain of interest in order to automatically determine information about relevant themes within the domain and/or about which documents have contents that are relevant to such themes. Such automatically determined information related to a domain may then be used in various ways, including to assist users in specifying themes of interest and/or in obtaining documents and/or document fragments with contents that are relevant to specified themes. In addition, information about how the automatically determined information is used by users may be tracked and used as feedback for learning improved determinations of relevant themes and relevant documents within the domain, such as by using automated machine learning techniques.
摘要:
Embodiments of the present invention provide platforms for data aggregation, communication, rule evaluation, and combinations thereof. The platform may include three distinct functional layers; a core layer, an adaptive layer and an intelligence layer. Furthermore, the platform may include a data block, messaging block, rule block, or combinations thereof. Generally, the platform may facilitate data acquisition, storage, and manipulation between and among clients and data sources in a generic manner. That is, clients may communicate and make requests independent of a target system or database type. The platform may process the communications and requests in a manner suitable to the target system or database type. The platform may also evaluate rules received from the clients in a manner generic to the client application. Instances of the platform for a given application may be efficiently created using a template-based mechanism. In this manner, the platform may be used to support a variety of end user applications in a flexible, scalable manner.