832 Warren Way, Palo Alto, CA 94303 • 908 507-9275
Us Patents
Two-Tier Authentication System Where Clients First Authenticate With Independent Service Providers And Then Automatically Exchange Messages With A Client Controller To Gain Network Access
Dharmender S. Dulai - New York NY Vinod R. Marur - Ridgefield CT Benjamin F. Vitale - New York NY Bruce A. Zenel - New York NY
Assignee:
Juno Online Services, Inc. - Westlake Village CA
International Classification:
G06F 15173
US Classification:
709225, 709229, 709203, 709217
Abstract:
A method and apparatus to control a client in a communication network accessed by the client through a service provider independent of a client controller. A hardware capable Internet Service Provider (ISP) functions as the communications network service provider. A virtual ISP operates the client controller, leases Internet access time from the hardware capable ISP, and resells Internet services to users. A client accesses the network through a two stage authentication process. First, the hardware capable ISP authenticates the client using a user-provided ID and password. After successfully logging on to the hardware capable ISP, the client automatically sends a start session message containing user identity information to the client controller. In response, the client controller sends a control message to the client authorizing use of the network for a predetermined time period. When the client stops accessing the network, the client informs the client controller using an end session message.
Alex Khesin - Hoboken NJ, US Andriy Bihun - Pine Bush NY, US Eduardo Morales - Harrison NJ, US Jason Goldman - San Francisco CA, US Jeff Reynar - New York NY, US Vinod Marur - Berkeley Heights NJ, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G06F 17/30
US Classification:
707736, 707711, 707741
Abstract:
A system may receive a feed associated with a blog. The system may extract information from the feed and the blog and create a hybrid document based on the extracted information. The system may further use the hybrid document to determine a relevance of the blog to a search query.
Andriy Bihun - Pine Bush NY, US Jason Goldman - San Francisco CA, US Alex Khesin - Hoboken NJ, US Vinod Marur - Berkeley Heights NJ, US Eduardo Morales - Harrison NJ, US Jeff Reynar - New York NY, US
Assignee:
Google Inc. - Mountain View CA
International Classification:
G06F 17/30
US Classification:
707723, 707728, 707729, 707730, 707736
Abstract:
A blog search engine may receive a search query. The blog search engine may determine scores for a group of blog documents in response to the search query, where the scores are based on a relevance of the group of blog documents to the search query and a quality of the group of blog documents. The blog search engine may also provide information regarding the group of blog documents based on the determined scores.
Audrey Nudd - Round Rock TX, US Keith Argenbright - Fort Worth TX, US Ronald Galbraith - Nashville TN, US Vinod Marur - Berkeley Heights NJ, US Prithwiraj Ghosh - Karnataka, IN Susan Milam - Austin TX, US
International Classification:
G06F017/60
US Classification:
705/008000
Abstract:
A healthcare solution system includes electronic appointment scheduling, medical inquiry session customization, patient response message customization, and broadcast messaging. The appointment scheduling allows patients to use a single front end user interface to communicate with plural medical providers who have disparate backend appointment systems, or no appointment system. The medical inquiry session customization allows medical providers to individually tailor queries and response options related to electronically solicited medical inquiries, such as an electronically requested patient history. The patient response message customization allows the provider to individually tailor responses to patient e-mail inquiries generated within the healthcare solution system. Broadcast messaging allows medical providers to target medical-related information to specific patients who may benefit from the message without compromising the confidentiality of the patients.
Andriy BIHUN - Pine Bush NY, US Jason Goldman - San Francisco CA, US Alex Khesin - Hoboken NJ, US Vinod Marur - Berkeley Heights NJ, US Eduardo Morales - Harrison NJ, US Jeff Reynar - New York NY, US
Assignee:
GOOGLE INC. - Mountain View CA
International Classification:
G06F 17/30
US Classification:
707728, 707E17108
Abstract:
A blog search engine may receive a search query. The blog search engine may determine scores for a group of blog documents in response to the search query, where the scores are based on a relevance of the group of blog documents to the search query and a quality of the group of blog documents. The blog search engine may also provide information regarding the group of blog documents based on the determined scores.
Method And Apparatus To Determine User Identity And Limit Access To A Communications Network
Peter Skopp - New York NY Benjamin F. Vitale - New York NY Vinod R. Marur - Ridgefield CT Clifford S.C. Tse - New York NY Dharmender S. Dulai - New York NY
Assignee:
Juno Online Services, Inc. - New York NY
International Classification:
G06F 1130 H04L 900
US Classification:
713201
Abstract:
A method and apparatus to determine user identity and limit access to a communications network. A first message containing user identity information is received from a client computer in accordance with a first protocol. A first network address is determined from the first message. A second message containing an information request is also received from the client in accordance with a second protocol, and a second network address is determined from the second message. The requesting user identity is then determined based on the first network address, the user identity information and the second network address. Based on the requesting user identity, it can be decided whether to grant the information request. If access is granted, the requested information is retrieved using the communications network.
Two-Tier Authentication System Where Clients First Authenticate With Independent Service Providers And Then Automatically Exchange Messages With A Client Controller To Gain Network Access
Dharmender S. Dulai - New York NY Vinod R. Marur - Ridgefield CT Benjamin F. Vitale - New York NY Bruce A. Zenel - New York NY
Assignee:
Juno Online Services, Inc. - New York NY
International Classification:
G06F 15173 G06F 1516
US Classification:
709225
Abstract:
A method and apparatus to control a client in a communication network accessed by the client through a service provider independent of a client controller. In one embodiment, a hardware capable Internet Service Provider (ISP) functions as the communications network service provider. A virtual ISP operates the client controller, leases Internet access time from the hardware capable ISP, and resells Internet services to users. A client accesses the network through a two stage authentication process. First, the hardware capable ISP authenticates the client using a user-provided ID and password. After successfully logging on to the hardware capable ISP, the client automatically sends a start session message containing user identity information to the client controller. In response, the client controller sends a control message to the client authorizing use of the network for a predetermined time period. When the client stops accessing the network, the client informs the client controller using an end session message.
- Mountain View CA, US Nam Hoang Mai - Milpitas CA, US Shu Niu - Palo Alto CA, US Beverly Yang Wong - San Francisco CA, US Vinod Ramachandran Marur - Palo Alto CA, US
International Classification:
G06Q 30/02
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for providing a customized content item. A method includes: receiving a content request; identifying one or more user device attributes and/or a context of the request; identifying a content item having distribution parameters matching the context and/or user device attributes and including one or more variables that are resolved based on the context or the one or more user device attributes; selecting, as modifying data, a subset of feed data to which the one or more variables for the content item will be resolved, including: identifying the feed data, evaluating the feed data to locate the subset; and selecting the modifying data; and modifying the content item, at least in part, by including, in place of the one or more variables, the selected modifying data; and providing the modified content item in response to the request.