会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Parental policy based online wish lists
    • 基于父母政策的在线愿望清单
    • US08762229B1
    • 2014-06-24
    • US11959439
    • 2007-12-18
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • Brian HernackiBruce McCorkendaleShaun Cooley
    • G06Q30/00
    • G06Q30/0633
    • A parental policy is enforced for online purchases. A parent enters a parental policy indicating items that are prohibited for a child. When the child attempts to add an item to a wish list, it is determined whether the item is permitted according to the policy. If so, the addition of the item to the wish list is allowed to proceed. If the policy prohibits the item, the addition of the item to the wish list is blocked. Additionally, the parent can be informed (via email, telephone, etc.) of the attempt to add the item to the wish list. The same logic can be applied to attempts to purchase items for children, or attempts to purchase items by children.
    • 强制执行家长政策进行网上购物。 父母输入父母政策,指示禁止孩子使用的项目。 当孩子尝试将项目添加到愿望清单中时,根据策略确定项目是否被允许。 如果是这样,则允许将项目添加到愿望清单中。 如果该政策禁止该项目,该项目添加到愿望清单将被阻止。 此外,父母可以通过(通过电子邮件,电话等)通知尝试将项目添加到愿望清单。 相同的逻辑可以应用于为儿童购买物品的尝试,或尝试购买儿童的物品。
    • 5. 发明授权
    • Systems and methods for determining a file set
    • 用于确定文件集的系统和方法
    • US08706745B1
    • 2014-04-22
    • US12130839
    • 2008-05-30
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • Shaun CooleyWilliam E. SobelBruce McCorkendale
    • G06F7/00G06F17/30
    • G06F21/564
    • A computer-implemented method for determining a file set may include identifying a file set and identifying a key file for the file set. The method may also include transmitting a key-file identifier to a second computing system. A first computing system may receive first and second file identifiers from a second computing system. The first computing system may determine whether the file set comprises a file identified by the first file identifier, and whether the file set comprises a file identified by the second file identifier. The method also includes transmitting a result of the determination to the second computing system. A method for determining a file set on a second computing device is also disclosed. Corresponding systems and computer-readable media are also disclosed.
    • 用于确定文件集的计算机实现的方法可以包括识别文件集并且识别文件集的密钥文件。 该方法还可以包括将密钥文件标识符发送到第二计算系统。 第一计算系统可以从第二计算系统接收第一和第二文件标识符。 第一计算系统可以确定文件集是否包括由第一文件标识符标识的文件,以及文件集是否包括由第二文件标识符标识的文件。 该方法还包括将确定的结果发送给第二计算系统。 还公开了一种用于确定在第二计算设备上的文件集的方法。 还公开了相应的系统和计算机可读介质。
    • 6. 发明授权
    • Referrer context aware target queue prioritization
    • 引用者上下文感知目标队列优先级
    • US08180761B1
    • 2012-05-15
    • US11965526
    • 2007-12-27
    • Shaun CooleyBruce McCorkendale
    • Shaun CooleyBruce McCorkendale
    • G06F17/00
    • G06F17/30864
    • A computer, computer program product, and method prioritize a web crawler target link queue using referrer context information associated with a remote object link. An access statistics collection module detects links to remote objects and retrieves referrer context information for the links. An access statistics back end module receives and stores the referrer context information from the access statistics collection module. The referrer context information is analyzed by a target list prioritization module that uses the results of the analysis to prioritize a target queue of a web crawler. The referrer context information is an important resource in identifying information about how a link spreads, e.g., for threat detection or identification of popular links for indexing to produce more relevant search results.
    • 计算机,计算机程序产品和方法使用与远程对象链接相关联的引用者上下文信息来优先考虑网络爬网程序目标链接队列。 访问统计信息收集模块检测到远程对象的链接并检索链接的引用者上下文信息。 访问统计后端模块从访问统计信息收集模块接收并存储引用者上下文信息。 引用者上下文信息由目标列表优先级模块分析,该模块使用分析结果来优化网络爬虫的目标队列。 引用者上下文信息是识别关于链路如何传播的信息的重要资源,例如用于威胁检测或识别用于索引的流行链接以产生更相关的搜索结果。