H04L67/50

System and method for applying tracing tools for network locations
11562380 · 2023-01-24 · ·

A method is disclosed for enabling a network location to provide an ordering process for data relevant to connected network devices' activities. The method includes assembling the data, utilizing the activity data, and associating the data, such that information is derived to enable a desired expansion of at least one designated activity. Another method is disclosed for managing an object assignment broadcast operations for a network location based on a network device's previous activities. This second method includes tracing a network device's conduct to determine that a network device prefers a particular class of content. The method also includes tagging a network device's profile with the respective observation and deciding by a network location as to the classification factor for a network device to be targeted for an object assignment broadcast.

Methods and apparatus to expand panelist enrollment

Methods, apparatus, systems and articles of manufacture to expand panelist enrollment are disclosed. An example apparatus includes a network communicator to enable the apparatus to communicate with a local area network. A media monitor is to monitor a media presentation of the apparatus and report monitoring data identifying the media presentation to a central facility. A network scanner is to scan the local area network and store an identification of a second device connected to the same local area network as the apparatus. A network information processor is to review the identification of the second device connected to the same local area network as the apparatus, the network information processor to add the identification of the second device to a fingerprint if the second device is commonly connected to the same local area network as the apparatus. A fingerprint reporter is to transmit the fingerprint to the central facility.

Enhancement of electronic communications and documents with links to contextually relevant information
11562035 · 2023-01-24 · ·

In an exemplary embodiment, an application server is disclosed that receives user information including textual content from a user device. The application server improves electronic communications and user collaboration by searching public or private databases for information relevant to the received textual information and providing a means for including selected related information such as links with an electronic communication or document when it is sent to a recipient. The application server interfaces with text messaging, instant messaging, email, and document applications to improve the information accuracy and efficiency of generating a document or message as well as improving the ease of communication and collaboration.

Third party monitoring of activity within a monitoring platform
11563845 · 2023-01-24 · ·

The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.

Event generation in response to network intent formal equivalence failures

Systems, methods, and computer-readable media for receiving an indication of an equivalence failure, the equivalence failure corresponding to one or more models of network intents. The indication of the equivalence failure is analyzed and one or more constituent intents that caused the equivalence failure are identified, wherein the one or more constituent intents are associated with a model of the one or more models of network intents. The granularity of the equivalence failure and the identified one or more constituent intents is determined, and an event for external consumption is generated, the event based at least in part on the equivalence failure, the granularity of the equivalence failure, and the identified one or more constituent intents.

METHODS AND SYSTEMS TO METER MEDIA CONTENT PRESENTED ON A WIRELESS COMMUNICATION DEVICE

An example apparatus to monitor media that is presented via a mobile device includes: an application monitor to determine when media presentation software is being executed by the mobile device; and a metering information collector to collect at least one of a signature or a code of the media presented by the media presentation software based on the media presentation software being executed by the mobile device.

SYSTEMS, METHODS, AND APPARATUS TO IDENTIFY MEDIA DEVICES
20230231929 · 2023-07-20 ·

Systems, methods, and apparatus to identify media devices are disclosed. An example network communications monitor includes network interface circuitry, computer readable instructions, and processor circuitry. The processor circuitry is to execute the computer readable instructions to detect, via the network interface circuitry, multiple network communications transmitted on a home network within the household, access panelist data that associates a panelist of the household with a panelist device of the panelist, determine, based on the panelist data, that one or more of the multiple network communications are associated with the panelist device, and cause storage of data identifying the one or more network communications in association with the panelist.

Methods and systems for cyber-monitoring and visually depicting cyber-activities

The present invention relates to methods and systems for cyber-monitoring and visually depicting cyber-activities. In certain embodiments, there is provided a method for visually depicting cyber-activities, entities, and/or entity-relations, said method comprising: displaying on a graphical user interface multiple visual representations comprising graphical components of one or more elements in a chronological order, using a time based tracking model, wherein each of said one or more elements is selected from a cyber-activity, entity, and entity-relation; wherein each of said visual representations represents a different level of a granularity and/or hierarchy; b) optionally displaying, optionally in response to a user action, a link to a selected element in each of said multiple visual representations.

THIRD PARTY MONITORING OF ACTIVITY WITHIN A MONITORING PLATFORM
20230231948 · 2023-07-20 · ·

The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.

CONTENT SHARING PLATFORM PROFILE GENERATION

Systems and methods are provided receiving, from a computing device associated with a first user of a content sharing platform, a request to access a second user profile associated with a second user in the content sharing platform, accessing activity data related to both the first user and the second user in the content sharing platform, determining common activity data to both the first user and the second user, wherein the common activity data comprises at least one media content item generated by the second user that was viewed or saved by the first user, or one or more datum saved by the first user from a communication received from the second user, and generating second user profile data comprising the common activity data related to both the first user and the second user in the content sharing platform as part of the second user profile.