G06F16/9566

System and Method of Using QR Codes for Accessing Life Details of a Deceased Person
20230023031 · 2023-01-26 ·

The present invention relates to a system and method for scanning and storing an obituary, social media accounts, pictures, videos, and other forms of media about a deceased person. The system stores the information in a database and provides a QR code that can be engraved or mounted onto a headstone, urn, or memorial device. The QR code includes an encoded URL of a website that is configured to display the stored information of the deceased person. The QR code is scannable using an imaging device and redirects to the website. The system enables authenticated users to update and edit information. The system helps memorialize loved ones and prevents their life history from being forgotten by future generations. The system can also be used with deceased pets' headstones/gravestones/markers.

USER NETWORK-BASED SUGGESTION FOR WEB BROWSER
20230025668 · 2023-01-26 ·

A computing device, running a web browser, can listen for an event on the web browser that is operated by a first user. In response to an occurrence of a first event, the computing device can obtain, through the web browser a URL or content of a web page being visited by the web browser. The computing device can obtain a unique identifier that is uniquely associated with a second user, based on the second user belonging to a network of users that is associated with the first user, and based on whether the unique identifier is applicable to the URL or the web page that is open in the browser. The computing device can present the unique identifier to the first user through the web browser.

SYSTEMS AND METHODS FOR ADVANCED TARGETING
20230229723 · 2023-07-20 ·

A system for testing the effectiveness of webpage configurations is disclosed. Tags indicating dependency between sections of a webpage may be associated with the sections. In response to a version of a first section of a webpage being tested, an associated tag may indicate that the content or behavior of a second section is dependent on the first section. A webpage configuration including content of the first section, and corresponding behavior and content of the second section, may be transmitted to a web client. Data may be collected indicating the effectiveness of the webpage configuration.

Instant generation and usage of HTTP URL based unique identity for engaging in multi-modal real-time interactions in online marketplaces, social networks and other relevant places

A User Engagement System (UES) has mechanism to allow a provider of a product or service to sign up with basic identity information along with any service description resulting in an instant URL as a means for outside parties to contact this provider and engage in multi-modal interactions involving voice, video, chat and media sharing. A single user or a group of users can sign up with this system and provide optionally some contact information such as phone numbers. An URL is instantly generated that can be advertised as hyperlinks to the outside environment such as on a website, email or any other means. This URL can be advertised by the system in various online marketplaces or social networks of the provider as well as on the web to be identified by search engines.

METHODS AND SYSTEMS FOR CONTEXT-SENSITIVE MANIPULATION OF AN OBJECT VIA A PRESENTATION SOFTWARE

Methods and Systems for context-sensitive manipulation of an object via a presentation software are disclosed.

Systems and methods for exporting, publishing, browsing and installing on-demand applications in a multi-tenant database environment

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.

Security token validation using partial policy validations

A policy engine validates one or more security tokens in an authenticated request using a sequence of partial policy validations. Multiple policies may be applied to the security token using the work product generated from each failed policy. The policy that succeeds in validating the security token has a portion of its work performed through previously-failed policies that did not complete successfully. In this manner, the validation of a policy is performed faster and more efficiently since the previous processing is not repeated whenever a new policy is applied.

Permission-based controlling network architectures and systems, having cellular network components and elements modified to host permission controlling schemas designed to facilitates electronic peer-to-peer communication sessions methods for use thereof
11564266 · 2023-01-24 · ·

In some embodiments, a method includes: generating, by a session controlling Internet platform, a personalized Universal Resource Locator link (PURL), including: where the PURL is: communicatively coupled to the permission controlling schema and configured to be utilized to establish a peer-to-peer communication session between a sender computing device and a recipient computing device; where the PURL includes: a domain name associated with the session controlling Internet platform hosting a permission controlling schema, and at least one first identity linked to the recipient computing device; transmitting, by the session controlling Internet platform, the PURL to the recipient computing device; receiving, by the session controlling Internet platform, after the transmitting the PURL to the recipient computing device, a mobile originating communication, having data including: a multi-part multi-functional address signaling sequence, including: a MICRO band part, corresponding to a MICRO band parameter and a MACRO band part.

Systems and methods for proactively informing users of an age of a merchant during online transactions

The disclosed systems and methods may request a merchant identifier associated with a merchant from a third party, receive the merchant identifier, retrieve or receive a first uniform resource locator (URL) associated with the merchant, and store the merchant identifier and the first URL in a database. In response to a web browser extension detecting that a user is preparing to make an online purchase associated with the merchant, the system may receive an age request for an age of the merchant from a user device and identify the merchant identifier in the database based on a second URL included in the age request. The system may then request the age of the merchant from the database based on the merchant identifier, receive the age of the merchant from the third party, and transmit the age of the merchant to the user device for display.

Tracking advertisements using a single URL without redirection
11704690 · 2023-07-18 · ·

Methods, systems, and computer storage media are provided for tracking an advertisement based on the advertisement's context. When an ad event is received on a client-computing device, a single URL is determined to display an item and track a context of the ad event. A first parameter related to the ad event is encoded as a HTTP header, and a second parameter related to tracking the ad event is encoded as a query parameter appended to the URL. The URL with the HTTP header is called, causing a domain server named in the URL to extract the first parameter from the HTTP header and the second parameter from the query parameter in order to determine the context of the ad. The domain server asynchronously requests tracking of the ad based on the context. Additionally, content for a landing page is received from the domain server.