G06F16/955

Client-side dynamic page feed management
11710138 · 2023-07-25 · ·

Disclosed herein are systems, methods, and apparatuses that can provide, for example, dynamic page feed recognition for providing zero-configuration analysis of web pages and tailored advertisement provision to website visitors. The systems, methods, and apparatuses can be used to analyze inventory feed. Based on analysis of user interaction data on the web pages, one or more matching methodologies can be used to determine matching data between the visited web pages and the inventory feed.

System and method for scanning a mobile computing device for installed applications

Systems, methods, and computer-readable storage media for scanning a mobile computing device for applications produced by partnered entities and providing benefits when those applications are found. An exemplary system does this by accessing a list of applications and associating each application with a respective entity which has a rewards program linked to a specific entity. The system issues a request for application information of the applications which are installed on the mobile computing device, identifies applications that match the list of applications in the data record, and generates at least one notification based on the identified applications and the rewards program. The system then displays the at least one notification.

URL Normalization

In one embodiment, a method includes receiving a plurality of uniform resource identifiers (URI's) associated with a particular domain. Each of the URI's identifies a content page comprising one or more signature elements. The method further includes, for each URI in the plurality of URI's, successively testing the URI to identify a core of the URI and any unnecessary elements of the URI. The core of the URI is sufficient to retrieve a version of the content page including all of its signature elements. The method additionally includes, for each URI in the plurality of URI's, updating a set of rules based on the identified core and the identified unnecessary elements. The set of rules establishes a normalized version of the URI.

Contextual drill back to source code and other resources from log data

A system receives real-time log messages from an executing process that experiences a runtime error. Information such as a filename and line number for the underlying source code may be embedded in the log messages using compiler macros. When the log messages are received, a developer URL may be generated that links a developer workstation directly to the underlying source code file and line number in a source code repository. A support URL may also be generated with a link to a support center and an embedded search string that retrieves resources that are known to address the process error.

Enhanced token transfer

Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.

Enhanced token transfer

Methods and systems for token transfer are described herein. A remote computing device may receive, from a mobile computing device, a public key of a public-private key pair. The public key may be associated with a first application of the mobile computing device. The first application may be configured to send credentials to a second application of the mobile computing device. The second application may be isolated from other applications executable on the mobile computing device. The remote computing device may receive, from the first application, a token. The token may have been previously issued to the first application and may have been encrypted, using the public key, by the first application. The remote computing device may send, to the second application, the token to enable the second application to authenticate with a plurality of services that interact with the second application.

Registered encrypted electronic message and redacted reply system
11711347 · 2023-07-25 ·

A method and system for processing an email having redacted content, and/or where the message content has been encrypted and recorded as encrypted, is provided.

Registered encrypted electronic message and redacted reply system
11711347 · 2023-07-25 ·

A method and system for processing an email having redacted content, and/or where the message content has been encrypted and recorded as encrypted, is provided.

SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT TO GENERATE A WEB APPLICATION USING REUSABLE THEMES
20230237250 · 2023-07-27 ·

In general, the technology relates to a method for using reusable themes. The method includes receiving, from a device, a request for a style sheet language file, where the style sheet language file defines a reusable theme for a webpage and specifies a relative location for an image that is used by the reusable theme. The method further includes receiving a request for the image including the relative location of the image, resolving the relative location for the image to obtain an absolute location for the image using a location of the style sheet language file in a web application structure, obtaining the image from the absolute location of the image, and providing the image to the device.

SYSTEMS AND METHODS FOR ANALYZING INFORMATION CONTENT
20230237115 · 2023-07-27 ·

A system may determine information in relation to a link in an interlinked set of information content items. A memory may store a set of machine-readable instructions operable, when executed by a processor, to receive a link context associated with a link in an information content item of the interlinked set. The link context may include information from the information content item providing context for the link. Instructions may also be operable to identify one or more additional links present in the link context and determine a link density as the proportion of the link context which includes the or each additional link relative to the size of the link context, and/or determine a text density as the proportion of the link context which does not include the or each additional link relative to the size of the link context and/or count the or each additional link.