Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

11963 results about "Business enterprise" patented technology

Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms

A method, apparatus, computer readable medium, computer system, wireless or wired network, or system to provide an online and / or mobile security of a user's privacy and / or security method of internet or mobile access or system, apparatus, computer readable medium, or system using encryption technologies and / or filters to access data, encrypt and / or decrypt data, sync data, secure data storage and / or process data using cloud technology across many different networks and / or fiber optic communications from an endpoint accessed through multiple devices, browsers, operating systems, networks, servers, storage, software, applications or services integrated in a public cloud or a private cloud within an enterprise, a social network, big data analytics or electronic surveillance tracking or some mashup of two or more to prevent the unauthorized collecting, tracking and / or analysis of a user's personal data by a third party and / or for generating relevant advertising, mobile, internet social messaging, internet posted promotions or offers for products and / or services.
Owner:HEATH STEPHAN

Secure execution of enterprise applications on mobile devices

A system is disclosed that includes components and features for enabling enterprise users to securely access enterprise resources (documents, data, application servers, etc.) using their mobile devices. An enterprise can use some or all components of the system to, for example, securely but flexibly implement a BYOD (bring your own device) policy in which users can run both personal applications and secure enterprise applications on their mobile devices. The system may, for example, implement policies for controlling mobile device accesses to enterprise resources based on device attributes (e.g., what mobile applications are installed), user attributes (e.g., the user's position or department), behavioral attributes, and other criteria. Client-side code installed on the mobile devices may further enhance security by, for example, creating a secure container for locally storing enterprise data, creating a secure execution environment for running enterprise applications, and / or creating secure application tunnels for communicating with the enterprise system.
Owner:CITRIX SYST INC

Customer centric revenue management

InactiveUS20090234710A1Improve recommendationsImprove definitionMarket predictionsSpecial data processing applicationsCustomer centricSoftware
CCRM is a business method and computer software system, to be used by Enterprises selling portfolios of products / services, aiming to optimize the expected value of transactions (or contracts) with consumers or business customers. At a transaction level, CCRM estimates the probability of choice of potential offers by the customer. These offers may be presented alone with possible variation of their attributes (such as price), or in combinations / sets, or in sequences. CCRM calculates the probability of consequent conversion and realization of the sale. Probabilities of choice and conversion are forecasted based on a disaggregated customer choice model, taking into account customer characteristics and stated preferences as well as product / service attributes such as price. Offers are then scored and ranked by expected value based on their revenue, cost and choice probability. Finally, CCRM recommends which offer(s) to present to the customer, at which price(s) and in which display / sequence order, to maximize a business objective function such as the expected value of the transaction / contract.
Owner:OPEN PRICER

Authentication and authorization methods for cloud computing security

An authentication and authorization plug-in model for a cloud computing environment enables cloud customers to retain control over their enterprise information when their applications are deployed in the cloud. The cloud service provider provides a pluggable interface for customer security modules. When a customer deploys an application, the cloud environment administrator allocates a resource group (e.g., processors, storage, and memory) for the customer's application and data. The customer registers its own authentication and authorization security module with the cloud security service, and that security module is then used to control what persons or entities can access information associated with the deployed application. The cloud environment administrator, however, typically is not registered (as a permitted user) within the customer's security module; thus, the cloud environment administrator is not able to access (or release to others, or to the cloud's general resource pool) the resources assigned to the cloud customer (even though the administrator itself assigned those resources) or the associated business information. To further balance the rights of the various parties, a third party notary service protects the privacy and the access right of the customer when its application and information are deployed in the cloud.
Owner:IBM CORP

Generating and/or serving local area advertisements, such as advertisements for devices with call functionality

Sets of local, (e.g., online) ads may be generated by obtaining sets of information about (e.g., local) establishments, each set including a business address information and / or a telephone number, (b) determining, for each of the sets, a location using at least one of at least a portion of the business address information and at least a portion of the telephone number, and (c) generating, for each of the sets, an ad that includes targeting information that targets the serving of the ad to queries related to the determined location. A query, including information about a location of a client device, may be accepted and at least one of the generated ads that includes targeting information that targets the location of the client device may be determined.
Owner:GOOGLE LLC

Integrated customer web station for web based call management

A Web-based call routing management workstation application which allows authorized customers to control toll free routing and monitor call center status. An architecture including one or more web servers located in a firewalled demilitarized zone (DMZ) as communications medium between the customer workstations at the customer sites and the enterprise back-end applications providing the call routing management services, provides a secure infrastructure for accessing the enterprise applications via the otherwise insecure public Internet. The present invention enables creation and management of call by call routing rules by a customer with a workstation having an Internet access and a supported Web browser. The customized rules may be tested and / or debugged via the Web-enabled workstation, using a debugger / tester which runs the routing rules under a simulated environment. In addition, customers may provision hierarchies for their business; create, modify or delete agent pools; manipulate capacity tables; and define quota schemes, value lists and schedule tables, all at the customer site via the Web-enabled workstation. The present invention also enables the customers to view near real-time displays of call center ACD statistics and peg counts based on routing rules, as well as, run provisioning and statistical reports on provisioning and statistical data and also to extract the data for further analysis. Additionally, the present invention supports foreign language and branding features on a graphical user interface. An infrastructure is provided which enables secure initiation, acquisition, and presentation of the call manager functionalities to customers from any computer workstation having a web browser and located anywhere in the world.
Owner:VERIZON PATENT & LICENSING INC

Systems, methods and computer program products for facilitating the sale of commodity-like goods/services

InactiveUS6965872B1Facilitating the sale of goods/servicesPrice fluctuationAdvertisementsBuying/selling/leasing transactionsComputer scienceEnd user
The invention provides systems and methods for facilitating the sale of commodity-like goods / services. The commodity-like goods / services at which the invention is directed, are of a type that are relatively indistinguishable from one brand, identity and / or outlet to another in end-use functionality and features. These types of goods / services are many times sold at retail under various brands or identities at multiple locations, to the final end user. Such goods / services may also or separately be of a type that are repeatedly purchased at intervals, and / or for which the price varies between purchases, from outlet to outlet or brand to brand. The goods / services may also be of a character such that they are not deliverable to the consumer, but require the consumer to travel to the retailer outlet. The system and methods also provide information relating to the consumers and competitors of a retailer of such goods / services. The invention establishes methods and procedures to define, organize, collect, distribute, and maintain information that can be used by the owner of a business selling commodity-like goods / services as well as by its customers. This information may include, but is not limited to, name brand of the product, location of the retailer, price of the product, other related goods / services available and their prices, and promotions. These processes may be performed and implemented on a computer network that is accessible in real time via a suitable communication device, such as a computer, wireless communication device, telephone or the like. A database of such information is created, allowing the consumer and other retailers to query the database using various search criteria. The consumer has the opportunity to obtain information about retailers of commodity-like goods / services that meet the consumer's requirements, and pricing may be guaranteed by the retailer.
Owner:GRDINA JEROME M

Web based integrated customer interface for invoice reporting

A Web-based invoice viewing system and method for enabling a customer to generate invoices relating to various network services provided to the customer by an enterprise. A Web enabled invoice viewing system provides billing and invoice information to remote customers having a workstation with a Web browser and an Internet access. A graphical user interface system at the customer workstation presents a list of invoice documents organized into products and date ranges applicable to the customer for the customer to select and view. Various displays presented at the customer workstation may be printed, faxed, or queued for batch printing at the enterprise remotely. The customer is enabled to view dynamically summed results of numerical figures displayed on the invoice documents by highlighting the numbers in the document directly on the display.
Owner:VERIZON PATENT & LICENSING INC

Utility high performance capability assessment

ActiveUS8311863B1High performance capabilityEasy to findCommerceCapacity assessmentProcess complexity
A high performance capability assessment model helps a utility industry business meet the challenges of the global marketplace. As a result, the utility industry business can achieve the clarity, consistency, and well-defined execution of core processes that reduce inefficiencies and waste that result from unnecessary process complexity and exceptions. In addition, the high performance capability assessment model helps the utility industry business to identify specific areas in which improvements may be made and understand how to make the improvements, and establishes levels of capability along the way to reaching an ultimate capability goal.
Owner:ACCENTURE GLOBAL SERVICES GMBH

Workflow system and method

A network-enabled workflow system is used in conjunction with a rules-based search engine to provide an easy-to-use interface to build workflow processes that facilitate the support for electronic business applications as well as business-to-business relationships. The system allows workflow services to be rendered to external organizations such as partners, suppliers, distributors and customers. Workflow services are preferably represented by roles that can be used to represent workflow actors in the workflow routing rules. These roles are preferably evaluated at run-time to best match recipients (via the MORSE algorithm) depending on the organization context from which the routing request is made. Furthermore, the network-enabled workflow system provides for the analysis of workflow processes in real time.
Owner:GINEGAR LLC

Key server for securing IP telephony registration, control, and maintenance

A packet-switched communications device in an enterprise network is provided. The packet-switched communications device has a corresponding unique identifier, such as an address or extension. The device includes a processor operable to (a) establish a secure communications session with a key generating agent in the enterprise network; (b) provide, to the key generating agent through the session, the unique identifier of the communications device; and (c) receive, from the key generating agent through the session, a secret key and a key identifier. An application server authenticates the packet switched device using the secret key. After authentication is successful, secure communications is established between the packet switched device and the application server.
Owner:AVAYA INC

Determining and/or using location information in an ad system

The usefulness, and consequently the performance, of advertisements are improved by allowing businesses to better target their ads to a responsive audience. Location information is determined (or simply accepted) and used. For example, location information may be used in a relevancy determination of an ad. As another example, location information may be used in an attribute (e.g., position) arbitration. Such location information may be associated with price information, such as a maximum price bid. Such location information may be associated with ad performance information. Ad performance information may be tracked on the basis of location information. The content of an ad creative, and / or of a landing page may be selected and / or modified using location information. Finally, tools, such as user interfaces, may be provided to allow a business to enter and / or modify location information, such as location information used for targeting and location-dependent price information. The location information used to target and / or score ads may be, include, or define an area. The area may be defined by at least one geographic reference point (e.g., defined by latitude and longitude coordinates) and perhaps additional information. Thus, the area may be a circle defined by a geographic reference point and a radius, an ellipse defined by two geographic reference points and a distance sum, or a polygon defined by three or more geographic reference points, for example.
Owner:GOOGLE LLC

Ontology for database design and application development

A system and method lets a user create or import ontologies and create databases and related application software. These databases can be specially tuned to suit a particular need, and each comes with the same error-detection rules to keep the data clean. Such databases may be searched based on meaning, rather than on words-that-begin-with-something. And multiple databases, if generated from the same basic ontology can communicate with each other without any additional effort. Ontology management and generation tools enable enterprises to create databases that use ontologies to improve data integration, maintainability, quality, and flexibility. Only the relevant aspects of the ontology are targeted, extracting out a sub-model that has the power of the full ontology restricted to objects of interest for the application domain. To increase performance and add desired database characteristics, this sub-model is translated into a database system. Java-based object-oriented and relational application program interfaces (APIs) are then generated from this translation, providing application developers with an API that exactly reflects the entity types and relations (classes and methods) that are represented by the database. This generation approach essentially turns the ontology into a set of integrated and efficient databases.
Owner:KYNDI

Facilitating commerce among consumers and service providers by matching ready-to-act consumers and pre-qualified service providers

A method and apparatus are provided for matching ready-to-act consumers and pre-qualified service providers. According to one aspect of the present invention, the Internet is used to attempt to solve communications problems and to achieve efficiency in Consumer-to-Business commerce transactions. Initially, a database of pre-qualified service providers is established. Then, a description of the consumer's needs may be extracted from a consumer using decision trees appropriate for the desired task. Subsequently, the consumer needs are packaged and presented to multiple service providers that meet a set of predetermined qualifications. The consumer needs may be presented, for example, by way of a set of heterogeneous communication devices depending upon preferences supplied by the service providers. For example, the set of heterogeneous communication devices may include facsimile, pager, mobile phone, home phone, office phone, Interactive Voice Response (IVR) unit, email, etc. The service providers may choose to submit a response for the consumer's needs or reject the task. After a sufficient number of responses have been received from the pre-qualified service providers, they are presented to the consumer. The consumer may then select from the pre-qualified service providers based upon one or more objective and / or subjective factors associated with the pre-qualified service providers. For example, objective service provider qualification information may be presented to the consumer along with the service provider responses. In addition, a database of consumer-generated service provider ratings and / or reviews may be maintained and made available for consumer queries.
Owner:SERVICEMAGIC

Determining and/or using end user local time information in an ad system

The usefulness, and consequently the performance, of advertisements are improved by allowing advertisers to better target their ads to a responsive audience. End user local time information, such as at least one of (a) a local time-of-day, (b) a local time-of-day range, (c) a local date, (d) a local day-of-week, (e) a local date range, (f) a local day-of-week range, and (g) a local season, is determined (or simply accepted) and used. For example, end user local time information may be used in a relevancy determination of an ad. As another example, end user local time information may be used in an attribute (e.g., position) arbitration. Such end user local time information may be associated with price information, such as a maximum price bid. Such end user local time information may be associated with ad performance information. Ad performance information may be tracked on the basis of end user local time information. The content of an ad creative, and / or of a landing page may be selected and / or modified using end user local time information. Finally, tools, such as user interfaces, may be provided to allow a business to enter and / or modify end user local time information, such as end user local time information used for targeting and end user local time-dependent price information.
Owner:GOOGLE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products