Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

99 results about "Opting out" patented technology

Systems and methods for performing two-way one-to-many and many-to-many auctions for financial instruments

A switch engine module receive interest rate risk portfolios from a plurality of traders, and for each prospective trader, provides available switches based on positions in other counterparty portfolios that offset the viewing traders' positions. The offsetting positions are encoded with credit preference information in order to identify eligible trades based on both counterparties credit preferences. In particular, an embodiment provides for a switch auction whereby users can use an auction process to trade for forward rate agreement switches with other counterparties, for example, in a two-way or many-to-many auction. In the switch auction, the price is predetermined by the system prior to the auction so that parties can opt out of the transaction if desired. The credit preferences of the participating traders are taken in consideration in making matches.
Owner:GFINET INC

Method and system for providing automated email optimization

A method and system for providing rules-based or algorithms based automated response optimization in the email-marketing environment such that recipient responses during the delivery process of an email campaign influence the delivery parameters and/or message elements of the portions of the campaign yet to be mailed. Responses to an email marketing campaign determine its marketing effectiveness and include delivery statistics, undeliverable statistics, opens, link-clicks, replies, opt-outs, and conversion events. Conversion events are recipient actions that are intended results from the marketing campaign and include marketing or service transactions that are completed online (e.g. purchases, registrations, filling out surveys, etc) and/or offline (e.g. brand awareness, store visits etc.). The system monitors emails as they are being received by recipients during delivery and, based on rules established by the marketer or on default rules established by the system using algorithms, tracks designated response statistics and dynamically alters the email elements, such as subject line and/or other content, including clickable links so that messages that produce the most desirable response statistics is sent to a greater percentage of the remaining recipients. Rather than completing the entire emailing operation using the same content throughout, this invention allows for changing the content for emails remaining to be sent so that the more effective content (in terms of stimulating favorable recipient reactions and purchases) is delivered to as many of the recipients as possible. Additionally, the process may be applied between separately mailed campaigns so that the delivery parameters for subsequent campaigns in a “campaign stream” are automatically modified based on the results of the prior campaigns in the stream and on the rules being applied to the stream.
Owner:EPSILON INTERACTIVE

Centralized Mobile and Wireless Messaging Opt-Out Registry System and Method

Provided herein is a centralized registry service enabling subscribers to “opt-out” of any or all mobile messaging programs. The registry service supports access to storage medium information by mobile and wireless carriers, companies operating mobile messaging programs, mobile applications or platforms, and most importantly, individual subscribers. The registry service can be used with any message based network, including non mobile networks.
Owner:SYNIVERSE ICX CORP

Changeable display components in an internet Web page

A host Web page includes an evolving interactive dialog box wherein an Internet user may enter user data to be processed. When the user completes entering user data in a first revolution of the interactive dialog box, the first revolution is replaced with a second revolution of the evolving interactive dialog box without disturbing or affecting any other part of the host Web page being displayed. Beneficially, the first and second revolutions may be communicated to a user computer together with and at a same time as the host Web page. Also, the second revolution may include a variety of data which is selected or customized to match the user data submitted in the first revolution. Each revolution of the evolving interactive dialog box may be comprised of any combination of general textual data entry fields, category (pull-down) menus, contact information data entry fields, and opt-in / opt-out buttons. The evolving interactive dialog box may also include dynamically selectable features, such as font type, font size, font color, box shape, box dimension(s), background colors, foreground colors, etc.
Owner:PAYPAL INC

Privacy-safe targeted advertising method and system

A method and system for sophisticated consumer deep profile building provided as a service in a certifiably clean, i.e., privacy-safe, manner to advertisers, ad networks, publishers, aggregators and service providers. In an embodiment, an entity provides a tracking and targeting service that acts as a container for sensitive consumer information. The entity preferably implements a stringent policy of transparency and disclosure, deploys sophisticated security and data anonymization technologies, and it offers a simple, centralized consumer service for privacy disclosure, review and deletion of collected profile information, opt-in, opt-out, and the like. In exchange, advertisers, ad networks, publishers, aggregators and service providers (including, without limitation, mobile operators, multiple service providers (MSPs), Internet service providers (ISPs), and the like), receive privacy-safe targeting services without ever having to touch sensitive information.
Owner:SIMEONOV SIMEON S

Expressing intent to control behavior of application components

Detection, identification, and control of application behavior dealing with malware, security risks, data privacy, or resource usage can be difficult in an era of complex, composite software applications composed of multiple components. Software applications are analyzed to determine their components and to identify the behaviors associated with each of the components. Components can also be analyzed with respect to similarity of previously known components. Behaviors can include use of personal identifying information or device information, or any actions that can be taken by applications on the device, including user interface displays, notifications, network communications, and file reading or writing actions. Policies to control or restrict the behavior of applications and their components may be defined and applied. In one embodiment this can include the identification of advertising networks and defining policies to permit various opt-out actions for these advertising networks.
Owner:LOOKOUT MOBILE SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products