Linked packet tracing techniques for software load balancers are described, as leveraging a client identifier generated to link packet traces between packets of a service provider system. In one example, a client-side packet is received from a client device by a processing system. From this, a client identifier is generated by the processing system based on the client device. In response, a modified client-side packet is generated by the processing system by modifying the client-side packet to include the client identifier. The modified client-side packet is transmitted by the processing system to a server system. A server-side packet is then received by the processing system from the server system. In response, the server-side packet is detected as including the client-identifier. From this, the server-side packet is linked to at least the modified client-side packet based on the detecting, and the processing system outputs a result of the linked packets.
One of the important signals that online platforms rely upon is the click-through rate prediction. This allows a platform, such as a video platform, to provide items, such as videos, to users based on how likely the user is to interact with the item. A hypergraph model is provided to exploit the temporal user-item interactions to guide the representation learning with multi-modal features, and further predict the user click-through rate of an item. The hypergraph model is built upon the hyperedge notion of hypergraph neural networks. In this way, item modalities, such as visual, acoustic, and textual aspects can be used to enhance the click-through rate prediction and, thus, enhance the likelihood that the online platform will provide relevant content. The technology leverages hypergraphs, including interest-based hypergraphs and item hypergraphs that uniquely provide the relationship between user and items. The hypergraph model described demonstrably outperforms various state-of-the-art methods.
Technologies are shown for mapping micro-video hashtags to content categories that involve collecting content categories from a content service, collecting micro-video, hashtags and user interaction semantic data from a micro-video service, determining a correlation of a content category to the micro-video, hashtags and user interaction semantic data using a multi-layer graph convolution network, and providing the hashtags correlated with the content category to the content service. The correlation can be determined by processing the semantic data with a concatenation layer and a full connected layer to produce a user-specific micro-video and hashtag representations. Similarity scores for determining correlation can be calculated from category content and a dot product of the representations. A content service can process a hashtag received from a micro-video application by identifying a content category correlated to the received hashtag, identifying content from the correlated category, and providing the identified content to the micro-video application for presentation.
A system for integrating various different advertisement platforms using different advertisement channels includes generating a logic campaign in an abstract layer. A basic unit is defined in the abstract layer by abstracting aspects of different advertisement campaign structures. The basic unit can be common among different advertisement structures for different advertisement channels. The advertisement structures are replicated by duplicating the structure and changing an advertising element node option associated with at least one advertisement element node of the replicated structure. The logic campaigns are generated from the advertisement element node options of corresponding advertisement element nodes. The logic campaign is associated with a physical campaign of a physical layer, which is employed by the advertisement platform. Thus, modification made to the basic unit in the abstract layer can implement changes to the physical campaigns of any of the different advertisement platforms of the physical layer.
A web browser extension identifies graphic objects from images or video being presented by a web browser. Webpages related to the graphic objects are identified. Web links that facilitate navigation to the webpages are embedded over an area of the image corresponding to the identified graphic image. Where the graphic objects are identified within video, the web links are progressively embedded within graphic object boundaries of the graphic object as the graphic objects move locations during progression of the video. In this way, a user is able to interact with graphic objects of images and video to navigate to webpages related to the graphic objects. Some implementations provide a webpage redirect command at a stop point of the video so that the user can interact with graphic objects while the video is playing and without interrupting the video.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 16/954 - Navigation, p.ex. en utilisant la navigation par catégories
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 16/957 - Optimisation de la navigation, p.ex. mise en cache ou distillation de contenus
Computer information retrieval by automatically marking at least a first item listing, of a first set of item listings, as a candidate for removal as a search result for a query. Such automatic marking occurs in response to receiving an indication that a selection has been made at a computing device, where the selection is at least partially indicative of the user requesting removal, from a set of search results, of a first item listing based on a particular attribute value associated with the first item listing.
A counterfeit item detection system detects counterfeit items during an item listing processes provided by an online marketplace. The system enhances the ability of the online marketplace to identify and reject potential counterfeit items. The system collects item data in various formats. The item data is analyzed using speech-to-text software and natural language processing to determine data elements representing items, item features, and language context. Questions are generated using the items and item features, and stored for each item. Answers to the questions have associated counterfeit indication weights. The weights are modified and used to rank the questions as feedback is received about counterfeit items. The ranking determines future question selection, allowing the best questions to continually be identified and provided. The counterfeit item detection system also trains a neural network to detect counterfeit items in images, where the training images are obtained from videos related to the item.
Technologies are shown for near-duplicate detection where a message is received and a fingerprint generated for some or all of its content. A distance metric is determined between the received message fingerprint and fingerprints for a cluster of other messages. If the message fingerprint matches a fingerprint in a cluster, then the received message is added to the matching cluster. A risk value associated with the matching cluster can be determined. If the risk value is greater than a risk threshold, the received message fingerprint can be added to a risk list or an alert, notification or block indication can be generated. A fingerprint can be determined for an inquiry message and, if the inquiry message fingerprint matches a fingerprint in the risk list, then an alert can be generated. The distance metric between fingerprints correlates to a similarity between the message content corresponding to the fingerprints.
Software is increasingly being developed as a collection of loosely coupled applications. Loosely coupled applications exchange data by publishing data to and retrieving data from a data store, such as a database, a file located on a storage cluster, etc. Data produced by one application and consumed by another is referred to as a data dependency. In some embodiments, an application's data dependencies are identified by analyzing cached query plans associated with the application. Query plans include a hierarchical representation of a query, where non-leaf nodes represent commands and leaf nodes identify data dependencies. An application's data dependencies are identified by traversing the hierarchical representation of the query. Data dependencies consumed by the application are identified by finding leaf nodes that descend from a read command, while data dependencies produced by the application are identified by finding leaf nodes that descend from a write command.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p.ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
G06Q 20/10 - Architectures de paiement spécialement adaptées aux systèmes de banque à domicile
10.
SEARCH SYSTEM RANKING USING A NATURAL DISTRIBUTION
A search engine is provided that generates search results proportional to a natural distribution. Search results identified and ranked by the search engine for a search query are redistributed so that a fixed number of top ranked search results include search result attributes proportional to the natural distribution, as determined from interaction tracking of prior search results. A natural distribution index mapping prior search queries to search result attributes and a proportional representation of interactions with the search result attributes is generated. The natural distribution is determined from the proportional representation of interactions. The search engine redistributes the fixed number of top ranked search results by minimizing a gap between the ranked set of search results for the search query and the natural distribution.
A method of monitoring variations in a randomized controlled trial, includes defining first and second experimental groups. A first set of data indicative of a first experimental group in the randomized controlled trial is received. A second set of data indicative of a second experimental group in the randomized controlled trial is received. Based on sample counts of the first and second sets of data, an indication is generated that the experimental groups in the randomized controlled trial are skewed.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p.ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données co
Systems, devices, media and methods are presented for generalized a personalized product review sort within an online marketplace. In one example, a system receives from a client device associated with a first user, a request to view an online listing. The system accesses a set of reviews associated with an online listing. The system determines the relevance of each review in the set of reviews based on a correlation between a first user and a second user. The system determines an adjusted rating associated with the online listing and presents the adjusted rating in a graphical user interface of the client device.
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
Systems and methods of improving the functioning of a computer system by implementing an adaptive encoding network are disclosed. In some example embodiments, a computer system transmits a new encoding assignment representing an encoding of a value with a new code to a consensus server, receives an approval of the new encoding assignment from the consensus server, and, based on the receiving of the approval of the new encoding assignment from the consensus server, applies the new encoding assignment to the value in subsequent messages to one or more machines, with the applying of the new encoding assignment comprising including the new code of the new encoding assignment in the subsequent messages in association with the value.
Disclosed are systems, methods, and computer-readable media for a geographic recommendation platform. The geographic recommendation platform receives data identifying a geographic region specified by a user and gathers data relating to the geographic region. The geographic recommendation platform determines, based on the data relating to the geographic region, an anticipated demand for an item within geographic region. The anticipated demand indicates how likely the item is to be purchased by a user that is located within the geographic region. The geographic recommendation platform generates a recommendation for the item based on the anticipated demand. The recommendation indicates the anticipated demand for the item within the geographic region. The geographic recommendation platform transmits the recommendation to the user.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
Systems and methods for managing a multi-listing combined offer are provided. A networked system receives an indication to add a combination of items from multiple sellers into a virtual cart. In response, the networked system causes presentation of a user interface showing a combination of items from multiple sellers. The networked system receives, from the buyer, a buyer offer price for the combination of items. In response, the networked system accesses, from a data storage, item information for each item of the combination of items, whereby the item information includes a seller identifier, an original item price, and shipping cost for each item. The networked system then generates, based on the accessed item information and the buyer offer price, a split offer price for each seller, whereby the split offer price is a split of the buyer offer price. The split offer price is then presented to each corresponding seller.
Disclosed are systems, methods, and computer-readable media for automated offer management. An offer management system determines predetermined affinity signals indicating respective candidate user interest in purchasing an item listed for sale on an online marketplace. The offer management system determines tiers of candidate users based on the affinity signals. Each tier includes a subset of the candidate users. In response to determining that a threshold period of time has elapsed, the offer management system transmits a first offer in relation to the item listed for sale to candidate users in the first tier of candidate users. The first offer includes an first offer price that is a deviation from the sale price of the item.
G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
G06Q 10/04 - Prévision ou optimisation spécialement adaptées à des fins administratives ou de gestion, p. ex. programmation linéaire ou "problème d’optimisation des stocks"
Systems and methods for conducting a test on a third-party testing platform are provided. A networked system causes presentation of a setup user interface to a third-party user, whereby the setup user interface includes a field for indicating an attribute of a publication to be tested. The networked system receives, via the setup user interface, an indication of the attribute, a subject to be tested, and one or more test parameters. The networked system applies the attribute change to a first version of the publication to generate a second version of the publication. The first version is presented to a first subset of potential users and the second version is presented to a second subset of potential users. Interactions with both the first version and the second version are monitored and analyzed to determine results of the test. The results are then presented to the third-party user.
en routeen routeen route to the destination. Then, when thresholds are reached for specific environmental conditions (e.g., temperature, acceleration, etc.), visualizations may be generated that graphically represent the item being exposed to such specific environmental conditions.
Delivery routing for an item is dynamically changed based on environmental conditions the item experiences during transport. The item may be associated with thresholds describing environmental conditions which must be maintained to avoid damage to the item. If sensors associated with the item detect deviation from the set thresholds during transport, instructions to reroute the item may be dynamically generated and provided to a vehicle or shipping agent responsible for transporting the item. Options for rerouting the item include returning it to the sender, disposing of it in a nearby disposal facility, sending to an inspection facility, or sending it on to the original destination location. The environmental thresholds associated with an item, records of conditions measured by sensors during transport, and alternative delivery locations may be stored in a distributed ledger such as a blockchain. Entities associated with the shipment may have access to the distributed ledger.
The disclosed technologies include receiving a request from a second computing device to verify ownership of a blockchain address. A challenge content is generated and sent to the requestor. A signature is received comprising a hash of the challenge content generated using a private key. A public key corresponding to the private key is obtained, and the signature is validated using the public key. In response to validating the signature, a characteristic is associated with a user associated with the blockchain address.
Technologies are shown for dynamically rerouting a package during shipment, that involve receiving a shipping route for shipping a package to a recipient and receiving rules for rerouting the package based on physical conditions. Physical conditions relating to the package and the recipient are monitored to determine whether one of the rules for rerouting applies to the conditions. If a rule applies to the conditions relating to the package and the recipient, an action defined for the rule is triggered. The action can include sending a reroute message to a shipper in the shipping route or notifying the recipient. In some examples, notifying the client includes offering a special delivery option. Physical conditions include a current time of day, a current location of the package, an anticipated location of the package, a current location of the recipient, an anticipated location of the recipient at the later time of day.
Described are computing systems and methods as well as computer program products for enhancing the detection of abnormal online user behavior by incorporating time-series data of behavior-based user clusters into an entity graph for purposes of entity resolution. In various embodiments, graph analysis performed on a graph that includes nodes representing users, user attributes, and user clusters serves to determine groups of similar user entities, which may then be merged and/or further analyzed to detect abnormal behavior.
G06F 16/215 - Amélioration de la qualité des données; Nettoyage des données, p.ex. déduplication, suppression des entrées non valides ou correction des erreurs typographiques
23.
AUGMENTED OR VIRTUAL REALITY (AR/VR) COMPANION DEVICE TECHNIQUES
An augmented reality or virtual reality (AR/VR) device pairs with a companion device to augment input interfaces associated with an AR/VR application at the AR/VR device. In implementations, an AR/VR device determines a portion of a markup file that corresponds to an AR/VR scene of a plurality of AR/VR scenes in an AR/VR environment, and communicates the portion of the markup file to the companion device to cause the companion device to configure a companion user interface associated with initiating an action as part of the AR/VR scene. In response to receiving user input via the companion user interface, the companion device communicates the action to the AR/VR device to initiate the action. The AR/VR device receives input data from the companion device, and initiates the action for the AR/VR scene.
An augmented reality or virtual reality (AR/VR) device pairs with a companion device to augment input interfaces associated with an AR/VR application at the AR/VR device. In implementations, an AR/VR device determines a portion of a markup file that corresponds to an AR/VR scene of a plurality of AR/VR scenes in an AR/VR environment, and communicates the portion of the markup file to the companion device to cause the companion device to configure a companion user interface associated with initiating an action as part of the AR/VR scene. In response to receiving user input via the companion user interface, the companion device communicates the action to the AR/VR device to initiate the action. The AR/VR device receives input data from the companion device, and initiates the action for the AR/VR scene.
Various methods and systems for providing batch search interfaces that support operations for dynamically generating batch search queries, executing batch search queries, and causing display of batch search query result items are provided. In operation, a batch search query interface for inputting images is generated. An image is received. A first feature and a second feature of the image are detected from the image. A first tag for the first feature and a second tag for the second feature are displayed on the batch search query interface. The tags refer to attributes associated with different features of the image. A batch search query based on the first and second tag is communicated to cause execution of the batch search query to generate search results. A first and second plurality of results associated with the respective tags are simultaneously displayed using feature-tag-specific results display portions of the batch search results interface.
Technologies are shown for trust delegation that involve receiving a first request from a subject client and responding by sending a first token having first permissions to the subject client. A second request from a first actor includes the first token and responding involves linking the first actor to the subject client in a trust stack and sending a second token to the first actor with second permissions, the second token being a first complex token that identifies the subject client and the first actor. A third request from a second actor includes the second token and responding to the third request involves linking the second actor to the first actor in the trust stack, and sending a third token to the second actor partner with third permissions, the third token being a second complex token that identifies the first actor and the second actor.
A global transaction system receives a transaction request for a plurality of database services of microservices. The global transaction system receives a plurality of local commit decisions of local commit requests from local transaction managers of the database services of the microservices. The local commit request corresponds to the transaction request for each database. The global transaction system generates a physical commit request to each of the local transaction managers based on the local commit decisions and a global commit decision. Each local transaction manager submits the physical commit request to each database server of the database services corresponding to the transaction request.
Technologies described reduce the amount of time between requesting content and receiving the requested content. In some embodiments, a client provides a search query. A search result page is generated and, prior to returning the search result page to the client, some or all of the search results are asynchronously pre-fetched and cached. The search query can include custom parameters that are also included in the pre-fetch requests. Web addresses in the search results page can be modified to indicate whether a prefetch operation was initiated. Once a user activates one of the search results, the responding web server uses the cached data while generating a response.
Dynamic link preview generation techniques are described that overcome the challenges of conventional techniques by supporting link preview generation by a content provider system that proves the digital content via a respective network address. In one example, a content provider system, based on a request received from a service provider system, identifies a communication platform of the service provider system that is to be used to communicate the shared link. Upon identifying the communication platform, the content provider system locates customization data that describes how the link preview is to be generated for the communication platform. In response, the content provider system renders digital content available via the network address to generate the link preview.
Described are computing systems and methods, computer program products, and application programming interfaces ( APIs) or web requests that facilitate code sharing between operators of e-commerce platforms. ln accordance with various embodiments, a codeshare principal shares its inventory and other functionality with a codeshare partner to thereby expand its customer base. Requests from the partner to the principal include identifiers of the partner as well as the partner's user, allowing the principal to track its extended customer base and tailoring responses to the partner and the user.
Disclosed are systems, methods, and non-transitory computer-readable media for generating incentivizing notifications to complete an uncompleted listing. A draft completion system determines, based on data included in an uncompleted listing for an item, a set of status values for the uncompleted listing. The uncompleted listing os associated with a first account of an online service. The draft completion system determines, based on the set of status values, a first incentivizing notification for the uncompleted listing. The draft completion system presents, on a client device associated with the first account, a user interface including the first incentivizing notification and at least one user interface element that enables a user to complete the uncompleted listing.
Technologies are shown for system level function based access control for smart contract execution on a blockchain. Access control rules control function calls at a system level by utilizing function boundary detection instrumentation in a kernel that executes smart contracts. The detection instrumentation generates a call stack that represents a chain of function calls in the kernel for execution of a smart contract. The access control rules are applied to the function call stack to allow or prohibit specific functions or function call chains. Access control rules can also define allowed or prohibited parameter data in the function call chain. If the function call chain or parameters do not meet the requirements defined in the access control rules, then the function call can be blocked from executing or completing execution. The access control rules can produce sophisticated access control policies based on complex function call chains.
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
G06F 21/54 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par ajout de routines ou d’objets de sécurité aux programmes
An experimentation platform controls testing of features by an application server. Based on a user identifier, the experimentation platform determines which feature should be provided, and the application server provides the corresponding version of a user interface. If the user behavior data shows that using a tested feature results in an improvement, the tested feature will be adopted. To determine whether or not an improvement is observed, a statistically significant amount of data is gathered. The experimentation platform gathers data regarding user behavior for the feature versions and, in response, adjusts the frequency at which each version is served. Providing the proposed version to an increased percentage of users decreases the total number of page serves required to gather statistically significant data. The experimentation platform may provide an updated projected time to completion of testing based on the changed percentage of users receiving the proposed version.
The "free world replication protocol" makes use of client computing resources, wherein the clients are not part of the replicated key- value store, but instead reside in the "free world" outside of the dedicated resources of the nodes of the replicated key-value store. In the free world replication protocol, only a single "write" client is authorized to modify the key- value store at any time but any number of clients may be authorized to read data from the key-value store. The write client sends its transactions to multiple nodes in the replicated key-value store. As a result, the latency between the transaction being sent from the client and the transaction being received by the multiple nodes is reduced by comparison to existing protocols in which each client sends transactions to a single node and that node forwards the transactions.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuées; Architectures de systèmes de bases de données distribuées à cet effet
H04L 12/801 - Commande de flux ou commande de congestion
Methods, systems, and devices for providing automatic adjustment to commission fees on a network-based marketplace. Consistent with some embodiments, a purchase offer for an item for sale is received via a user interface of a client device, the purchase offer including an offer price. Upon determining that the offer price is below a listed price, a commission fee reduction value is computed based on a difference between the listed price and the offer price. A reduced commission fee is determined based on the commission fee reduction value and a standard commission fee. Upon determining that the reduced commission fee satisfies a condition defined by a set of rules, a transaction for the sale of the item is automatically completed based on the reduced commission fee, the completing of the transaction comprising reducing the listed price by the commission fee reduction value.
Technologies are provided for generation of composite messages using qualifying events corresponding to respective ticketed performances and qualifying actions of a subscriber of a service platform. By analyzing qualifying events and qualifying actions jointly, the disclosed technologies supply a number of contextually-relevant individual messages collected in a composite message that is delivered to subscriber periodically. The individual messages describe ticketed performances that are relevant to the subscriber. The composite message also provides reasons for the inclusion of the individual messages in the composite message. The individual messages can be arranged within the composite message according to a layout based on a ranking of priority scores. Each priority score conveys a level of relevancy of a ticketed performance with respect to a subscriber. The provided technologies, therefore, supply a composite message that can match the subscriber to personalized ticketed performances while reducing the number of messages received by the subscriber.
Methods and systems for automatic publication of listings on an ecommerce system are disclosed. In one aspects, a method include filtering historical item listings for items to those items having a similarity to a particular item, determining predictions of future sales prices over future time periods for the particular item based on the filtered historical items, the determined predictions including future sales prices having different probabilities of sale completion, receiving a user selection indicating one or more predictions of future sales prices over one or more future time periods; and determining a time to initiate publication of an on online listing for the particular item based on the selected one or more predictions.
Technologies are shown for storing component state data for a resource on a blockchain involving generating a resource data block that corresponds to a resource that includes links that correspond to components of the resource, generating a first component state data block for a component of the resource on a blockchain that includes first state data for the first component, and setting the link for the component to reference the first component state data block. Subsequently, a second component state data block can be generated for the component with second state data and the second component state data block linked to the first component state data block.
G06F 21/16 - Traçabilité de programme ou de contenu, p.ex. par filigranage
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
39.
DIGITAL CONTENT RECONFIGURATION BASED ON PHYSICAL ACCOMMODATIONS
Digital content reconfiguration techniques and systems are described that address physical accommodations. In one example, a physical accommodation module identifies a type of digital content being requested and obtains the digital content. The physical accommodation module also obtains ticket data associated with a user that made the request. The ticket data is then processed by the physical accommodation module to determine a physical accommodation. The determined physical accommodation is then used by the physical accommodation module to reconfigure the digital content, and as such, may dynamically address the physical accommodation, e.g., for mobility, visual, auditory accommodations, whether the user is attending the event with minor children, and so forth.
Technologies are shown for intervehicle communication involving notification messages sent from one vehicle to another vehicle. Sensor event data from one vehicle can be sent in a wireless message to another vehicle and information from the wireless message displayed to a driver of the other vehicle providing the driver with information that may not be detectable by the sensors in the driver's vehicle. The information from the wireless message can be displayed to the user on a user interface and can include a representation of an object detected by the other vehicle along with information about the position, speed, type or direction of the detected object. User interfaces can include graphical user interfaces, haptic devices and audio devices.
B60Q 9/00 - Agencement ou adaptation des dispositifs de signalisation non prévus dans l'un des groupes principaux
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p.ex. pour le traitement simultané de plusieurs programmes
H04M 11/04 - Systèmes de communication téléphonique spécialement adaptés pour être combinés avec d'autres systèmes électriques avec systèmes d’alarme, p.ex. systèmes d’alarme d'incendie, de police ou systèmes antivol
Technologies described herein reduce the size of a software application. In some embodiments, the size of one or more resource files of an application are reduced. Resource files include key/value pairs that define elements of the application. In some embodiments, the application's source code is analyzed to determine if an entry in a resource file may be removed. For instance, initialization functions in the application's source code may be analyzed to determine if a value loaded from a resource file is replaced before being used. For example, a button with a color property may be defined as grey by a resource, but later set to orange in an initialization function. In this case, the resource entry defining button as grey is superfluous and may be safely removed. This technique allows for entries to be removed from a resource file even though the source code references the entries.
Deployment of a modified service affects the functioning of other services that make use of the service. To address the problems that deployment of modified executable code can cause in other services, a dependency lock is placed on candidate code to prevent deployment until tests on the client services are successfully completed. Developers of client services that rely on a supplier service are enabled to place a dependency lock on the service. As a result, deployment of the supplier service is only allowed when tests of the client services complete successfully. The administrator of the service being deployed may control which other users are able to add dependency locks without giving those users other permissions such as the ability to modify the source code of the service, the ability to deploy the service, and the like.
A machine is configured to generate in real time personalized online banner images for users based on data pertaining to user behavior in relation to an image of a product. For example, the machine receives a user selection indicating one or more data features associated with the user. The one or more data features include a data feature pertaining to user behavior in relation to an image of a product. The machine generates, using a machine learning algorithm, a data representation of the machine learning algorithm based on the one or more data features including the data feature pertaining to user behavior in relation to the image of the product. The data representation includes one or more data features pertaining to one or more characteristics of online banner images. The machine generates an online banner image for the user based on the data representation.
Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 17/22 - Manipulation ou enregistrement au moyen de codes, p.ex. dans une séquence de caractères de texte
45.
DISTRIBUTED APPLICATION ARCHITECTURES USING BLOCKCHAIN AND DISTRIBUTED FILE SYSTEMS
Technologies are shown for storing a data object in a distributed application architecture. Critical data in the data object is stored in an object data block on a blockchain. Noncritical data elements in the data object are stored in data block files at an address on a distributed file system, where the addresses are stored in the data block. The object data block is retrieved from the blockchain. The noncritical elements are retrieved from the file system using the address in the data block. The critical and noncritical elements are combined into a reassembled data object. The critical and noncritical data elements can be differentiated in a data definition for the data object or algorithmically analyzing data in the data object. Metadata for the data object can be stored in the object data block and utilized to combine the critical and noncritical elements into the reassembled data object.
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
46.
DIGITAL IMAGE SUITABILITY DETERMINATION TO GENERATE AR/VR DIGITAL CONTENT
Techniques image suitability determination to generate augmented reality/virtual reality (AR/VR) digital content are described. A two-dimensional digital image is received. Using machine-learning, a determination as to whether an object captured by the two-dimensional digital image is suitable for generating AR/VR digital content for display in an AR/VR environment is made. If the object is suitable, an indication is provided and an option to view the object in an AR/VR environment is provided. If the object is not suitable, a suggestion indicating why the object as captured is not suitable and/or how to correct the capture of the object in a subsequent digital image such that it is suitable for generating AR/VR digital content.
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
G06K 9/03 - Détection ou correction d'erreurs, p.ex. par une seconde exploration
A server accesses a plurality of users' sessions with the web server. Each user session indicating a page flow of a corresponding user session for a plurality of web pages provided by the web server. The server generates a learning model using a neural network based on the plurality of users' sessions. The learning model is configured to predict a next user activity based on a current page flow of a current user session. The next user activity indicating one of continuing the current user session by visiting another web page provided by the web server and ending the current user session. The server dynamically adjusts a content of a web page based on the predicted next user activity.
Systems and methods for improving a search process are provided. A networked system accesses, from online sources, fashion trend information including pictures illustrating fashion trends. The networked system determines a plurality of top fashion trends, and extracts, using an image detection algorithm, images of fashion items from a picture associated with each of the top fashion trends. Using the extracted images, the networked system performs an image search for matching inventory items. The networked system then generates and stored a plurality of fashion trend user interfaces, whereby the plurality of fashion trend user interfaces each comprise selectable elements that represent the plurality of top fashion trends. At runtime, the networked system receives an indication to initiate a search for fashion by trends, and in response, accesses the plurality of stored fashion trend user interfaces. One of the plurality of stored fashion trend user interfaces is presented on a user device.
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06F 16/583 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
49.
AUTOMATED DETERMINATION OF WEB PAGE RENDERING PERFORMANCE
Automated determination of web page rendering performance techniques and systems are described. In one example, a web page including multiple user-interactive elements that can be selected or navigated via user input is received. A frame rendering system is employed to automatically identify the user-interactive elements and generate scripts to simulate user input at the user-interactive elements. The generated scripts are then used to simulate user input at the user-interactive elements. The scripts may be generated to simulate user interaction via a variety of different device types, and under a variety of different network conditions. During the simulation, a rendering performance score for the web page is generated by monitoring rendering performance relative to a threshold rendering rate. Rendering performance may be monitored on an individual basis while simulating user input at different user-interactive elements, such that the rendering performance report includes individual rendering performance scores for each user-interactive element.
Augmented reality (AR) digital content search and sizing techniques and systems are described. These techniques overcome the limitations of conventional techniques by bridging a gap between user interaction with digital content using a computing device and a user's physical environment through use of augmented reality content. In one example, user interaction with augmented reality digital content as part of a live stream of digital images of a user's environment is used to specify a size of an area that is used to filter search results to find a "best fit". In another example, a geometric shape is used to represent a size and shape of an object included in a digital image (e.g., a two-dimensional digital image). The geometric shape is displayed as augmented reality digital content as part of a live stream of digital images to "assess fit" of the object in the user's physical environment.
Detecting selection of disabled inner links within nested content techniques are described herein. In one or more implementations, a document comprising nested content is displayed on a display of a computing device. The nested content is obtained from a third-party source and includes one or more disabled inner links to respective target portions within the nested content. A disabled link service monitors an address associated with the third-party source of the nested content to detect an address change corresponding to a user selection of one of the disabled inner links within the nested content. Responsive to detecting the address change, a respective target portion of the nested content associated with the selected inner link is located by scanning the nested content. The document is then scrolled to cause display of the target portion of the nested content on the display of the computing device.
G06F 16/958 - Organisation ou gestion de contenu de sites Web, p.ex. publication, conservation de pages ou liens automatiques
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
Methods and systems for protecting seller privacy during an ecommerce transaction are disclosed. In one aspect, a method includes, receiving, via an online listing configuration interface for a first session, one or more candidate pick up times and specific pick up locations for an item, determining a generalized version of the one or more specific pick up locations, displaying, via a second session, an online listing for the item, displaying, via the second session, the one or more candidate pick up times and the generalized versions of the one or more specific pick up locations, receiving, via the second session, a selection of one of the candidate pick up times and one of the generalized versions of one of the specific pick up locations, in response to receiving payment for the item, displaying a specific pick up location corresponding to the selected one generalized version.
Disclosed is a tamper proof tag and accompanying method for verifying that a watch is authentic and has not been tampered with. The tamper proof tag, when affixed to the watch, ensures that the watch is authentic and prevents a user from tampering with the watch. The tamper proof tag also allows the watch to be worn while the tamper proof tag is affixed to watch and is minimally obstructive to the aesthetics of the watch. This provides a purchasing user with confidence that the watch is authentic, while also allowing the user to try on the watch without having to remove the tamper proof tag. The tamper proof tag also protects the seller from a user that may attempt to tamper with the watch after purchase. For example, the seller may condition returns for a sold watch on the tamper proof tag remaining affixed to the watch.
A server detects that a first user is leaving a display of a listing provided by a publication application. The listing identifies an item and a corresponding a disclosed attribute value. The server queries the first client device for a desired attribute value. The server receives the desired attribute value and a commitment to the desired attribute value from the first user. The server accesses a database of hidden attribute values for the item and corresponding quantity range attribute values for the item listed with a first provider. The hidden attribute values and corresponding quantity range attribute values are provided by the first provider and hidden from the first client device. The server generates a fulfillment request to the first provider.
Systems and methods for improving an information provisioning system using a natural language conversational assistant is provided. A machine agent initiates an interactive natural language conversation with a user to provide the user with guidance on one or more products. The machine agent receives a request for information from the user, and accesses, from a product knowledge database, textual statements about features of the one or more products, whereby the textual statements are obtained by a machine-based offline knowledge extraction process that extracts the textual statements from reviews or product guides. Based on the accessed textual statements and an overall empirical utility of each of the accessed textual statements, the machine agent determines one or more statements of the accessed textual statements to convey to the user. The machine agent causes presentation of the one or more statements to the user.
A system to receive data indicative of physical location from a first computing device and to associate an event with the physical location, the event occurring at the physical location and including the physical presence of two or more entities. The system further to receive registration information from one or more entities that are associated with the event and to generate, using the registration information, a data object to enable a first entity of the one or more entities and a second entity of the one or more entities to exchange one or more items while the first entity and the second entity are both physically present at the event. The system additionally to publish the data object to a second computing device based on a participation criteria, the second device being operated by at least one of the first entity and the second entity.
An automated content entry detection system to identify inputs received automated agents. Aspects of the automated content entry system include various functional components to perform operations that include: receiving entries that comprise inputs into one or more data entry fields from user accounts; determining behavioral data of the entries based on one or more input attributes of the entries; generating a prediction to be assigned to the user accounts based on the one or more attributes of the entries; and performing operations that include denying further requests received from the automated agents based on the prediction.
A real-time negotiation system to provide functionality to generate and cause display of specially configured graphical user interface for real-time negotiation within a networked marketplace. According to certain example embodiments, aspects of the real-time negotiation systems include various functional components to perform operations that include receiving a signal from a user, via a first client device, wherein the signal indicates an implicit interest in a first item that comprises a set of item attributes.
Disclosed herein are virtual assistant methods, systems, and devices to identify users in need of guidance and to provide the guidance in response to identifying the need. Consistent with some embodiments, a method includes receiving, at a virtual assistant device, user input associated with a user profile and identifying an item category corresponding to user input. The method further includes detecting an anomalous relationship between the user profile and the item category based on user activity associated with the user profile. The method further includes causing the virtual assistant device to provide guidance with respect to the item category in response to detecting the anomalous relationship. The guidance includes presenting guidance information comprising attribute values of at least one item from the item category. The attribute values correspond to attributes of interest determined from additional user input.
Various embodiments described herein assist in identifying one or more product items of interest (e.g., high demand product items) based on surge activity, such as user buying surges, user selling surges, and user product listing (e.g., electronic or online listing) surges on an online marketplace system, and can further notify one or more users of selling opportunities of the identified products items of interest.
A system configured to receive (805) image data associated with an item, where the image data comprising a view of the item from two or more angles; determine (810) physical attributes of the item; generate (815) a base model of the item; sample (820) the base model to generate one or more sampled models, each of the one or more sampled models comprising a subset of the geometric data, the subset of the geometric data determined based on one or more device characteristics of one or more user devices that interface with the system; receive (825) device characteristics of a user device associated with a request from the user device for the item; select (830), based on the received device characteristics, a sampled model of the item; and transmit (835) a data object comprising the selected sampled model to the user device to cause the user device to generate a three-dimensional rendering of the item.
H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p.ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données co
An automated encryption system to: store a first key policy in association with a first key, and a second key policy in association with a second key; determine that a remote machine stores a first application that is affected by the first key policy and a second application affected by the second key policy, wherein the first application utilizes the first key to encrypt first data, and the second application utilizes the second key to encrypt second data; determine that the first key of the first application is non-compliant with the first key policy; send a request to deploy a third key in response to determining that the first key of the first application is non-compliant with the first key policy; and receive a response that includes a result of the request to deploy the third key.
A system comprises servers having processing circuits and a non-transitory storage medium, the non-transitory storage medium having computer code that is executable to cause the system to receive a unique identifier and to identify, in response to receiving the unique identifier, a virtual object stored by the one or more servers in association with the unique identifier. The computer code is further executable to transmit the virtual object and an immersive simulated three-dimensional environment to a separate device and to receive virtual motion data of a virtual movement of the virtual object relative to the immersive simulated three-dimensional environment. The computer code is further executable to determine that separate device is authorized to access a resource of the system and to transmit, in response to the determination that the user of the separate device is authorized, an authorization message to the separate device.
Colored three-dimensional digital model generation techniques and systems are described. In one example, scanning techniques are employed by a scanning system that scans a physical object while disposed within packaging to form a three-dimension digital model. A model coloring system is employed to color the three-dimensional digital model. A two-dimensional digital image is employed that captures the same or similar physical object. In one example, features of the model are matched to the image. This is then used to align a viewing perspective with respect to the model with a viewing perspective of the object within the digital image, e.g., to find which "view" of the model corresponds with the image. The color is then applied from the digital image to the model, e.g., from pixels of the image to corresponding points in the model.
Disclosed are systems, methods, and computer-readable media for using adversarial learning for fine-grained image search. An image search system receives a search query that includes an input image depicting an object. The search system generates, using a generator, a vector representation of the object in a normalized view. The generator was trained based on a set of reference images of known objects in multiple views, and feedback data received from an evaluator that indicates performance of the generator at generating vector representations of the known objects in the normalized view. The evaluator including a discriminator sub-module, a normalizer sub-module, and a semantic embedding sub-module that generate the feedback data. The image search system identifies, based on the vector representation of the object, a set of other images depicting the object, and returns at least one of the other images in response to the search query.
G06K 9/46 - Extraction d'éléments ou de caractéristiques de l'image
G06K 9/00 - Méthodes ou dispositions pour la lecture ou la reconnaissance de caractères imprimés ou écrits ou pour la reconnaissance de formes, p.ex. d'empreintes digitales
A server receives an initial query that identifies a first item listed by a first user account and an initial query value for the first item. The server provides the initial query to a first computing device associated with the first user account and receives a first response to the initial query from the first computing device. The first response indicates a rejection of the initial query value. In response to the rejection, the server identifies a second item listed by a second user account. The second item includes a shared attribute with the first item. The server substitutes the initial query with a replacement query that identifies the second item and the initial query value for the first item. The replacement query is provided to a second computing device associated with the second user account.
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
G06F 16/38 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
67.
PHYSICAL OBJECT BOUNDARY DETECTION TECHNIQUES AND SYSTEMS
Physical object boundary detection techniques and systems are described. In one example, an augmented reality module generates three dimensional point cloud data. This data describes depths at respective points within a physical environment that includes the physical object. A physical object boundary detection module is then employed to filter the point cloud data by removing points that correspond to a ground plane. The module then performs a nearest neighbor search to locate a subset of the points within the filtered point cloud data that correspond to the physical object. Based on this subset, the module projects the subset of points onto the ground plane to generate a two-dimensional boundary. The two-dimensional boundary is then extruded based on a height determined from a point having a maximum distance from the ground plane from the filtered cloud point data.
Disclosed are systems and methods for receiving a plurality of comments at a particular phase of a transaction with a member of a networked system, classifying one or more of the plurality of comments into one of a set of predetermined sentiment classifications, applying a trained machine learning system to select a category from a set of predefined categories for each of the one or more comments, applying a natural language processing module to generate a sub-category for each of the one or more comments, associating the generated sub-categories with their respective categories for the one or more comments, and generating a display of the determined categories for the particular transaction with the generated sub-categories, each generated sub-category being graphically connected to their respective categories.
A system includes one or more processors and a machine-readable storage device comprising processor executable instructions that, when executed, cause the one or more processors to perform a set of operations comprising receiving a search request for one or more database records of a network based publication system, and identifying a first database record corresponding to at least a portion of the search request, where the database record having a first element. The set of operations also include selecting a second element of a second database record based on the first database record and adjusting the first element of the database record based on the second element. The set of operations then includes generating a formatted user interface comprising a representation of the database record and the adjusted first element, and causing, in response to the search request, presentation of the formatted user interface on the remote computing device.
Various methods and systems for providing query result titles using a problem-solution search engine in a search system are provided. A query is received; the query is identified as a free-text query. Problem description features are identified from the free-text query. The problem description features characterize an issue described in the free-text query. Solution description features associated with product titles are accessed, where solution description features characterize a resolved issue described in a product review. A product associated with the product review is the product that resolved the resolved issue in the product review. The problem description features are compared to the solution description features. A product title is identified as a query result title. The product title is selected based on solution description features of the product title corresponding to the problem description features of the free-text query. The query result title is communicated.
The present disclosure relates to compositions and methods for marking/tagging objects for identification. In particular, tagging objects with a nucleic acid taggant (genetic tag-based merchandise authentication).
Visual diagram searching techniques are described herein. A visual diagram service enables users to efficiently search for data for item parts even in cases where the name of the item part is unknown. In one or more examples, search query input to locate item parts of an item is received via a user interface displayed by at least one computing device. A visual diagram of the item is displayed in the user interface. The visual diagram includes selectable portions mapped to respective item parts depicted in the corresponding selectable portion of the visual diagram. A user selection of one of the selectable portions of the visual diagram of the item is received via the user interface. In response to the user selection, search result data corresponding to the respective item part depicted in the selected selectable portion of the visual diagram of the item is displayed.
Methods, systems, and apparatus for facilitating a comparison of content in a user interface are described. Two or more open browser interfaces of a browser are identified, each of the two or more open browser interfaces containing an item description of one or more items. The browser interfaces include at least one of a tab of the browser or a window of the browser. One or more features related to each of the one or more items from at least two of the item descriptions are extracted or identified. The comparison for a plurality of items is generated based on the extracted or identified one or more features. The comparison of the plurality of items is displayed within at least one of the browser interfaces.
Various embodiments described herein enable a machine to identify electronic transactions involving a multi-directional electronic transaction arrangement on an electronic transaction system, such as an e-commerce website or platform that facilitates an online marketplace. Additionally, some embodiments identify multi-directional electronic transaction arrangements that facilitate multi-directional bartering between two or more e-commerce users, where the bartering may between multiple selling users not in a bartering chain or cycle.
Based on an analysis of historical data of listings for an item, an online marketplace generates a price curve for the item to describe the likelihood to sell as a function of price. Based on user preference data, an analysis of historical data of listings by a user account, or both, the online marketplace generates a utility curve for the user account. Using the utility curve, the online marketplace estimates the utility for the user account as a function of the item price and the seller's preferences. By considering both the utility curve for a user account and the price curve for an item, the online marketplace generates utility-based price guidance for a particular seller of the item. A user interface presents the utility-based price guidance to the user, and enables the user to set the price of the item based on the price guidance.
Systems and methods provide real-time machine learning modeling, evaluation, and visualization. A computing system can receive input values for attributes of a new item listing. Concurrently, the system can analyze previous related item listings. The system can process the attributes and associated values of the new listing and previous listings to extract features and associated values. The system can apply the features of previous listings to machine learning algorithms to generate a machine learning model directed towards a target objective. The system can determine a likely outcome of the new listing by applying user-input values to the model and alternative outcomes by substituting one or more user-input values. If the alternative outcomes represent better results, then the system can present suggestions to revise the new listing to replace one or more user-input values with substitute values.
Methods, systems, and media for user authentication in hybrid online and real-world environments are disclosed. In one example, a method comprises providing a real-world environment including a display of physically retrievable items available for purchase, detecting the presence of a user device associated with a user in the real-world environment, and storing identity data received from the user device. Interest data for one of the physically retrievable items is identified based on sensed biometric data of the user and an online offering for a comparable online item is automatically implemenented without manual operation of the user device. A user identification associated with an online account is derived based on the stored identity data received from the user device and the online offering for the item comparable to the physically retrievable item is provided to the online account associated with the user identification.
Methods, systems, and media for facilitating user engagement in offline transactions are disclosed. In one example, a method includes listing items for sale, at online prices, in an online publication system. A real-world environment is provided that includes a display, at offline prices, of physically retrievable items corresponding to the items listed for sale in the online publication system. A proximity or location of a user device relative to the real-world environment is detected, and a reduction is applied to an offline price of an item based on the detected proximity or location of the user. The applied reduction reduces the offline price to a price lower than the online price for the corresponding online item listed for sale in the online publication system. The presence of the user device is detected within the real-world environment and a purchase transaction for the item is validated and completed.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Architectures, schémas ou protocoles de paiement - leurs détails
G06Q 20/40 - Autorisation, p.ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasin; Examen et approbation des payeurs, p.ex. contrôle des lignes de crédit ou des listes négatives
79.
IDENTIFYING COMPUTING DEVICES WITH GEOGRAPHIC PROXIMITY
A server receives a description of an item from a first computing device. The server determines attributes of the item based on the description of the item. The server identifies a geographic region based on the attributes of the item. The server identifies a second computing device that is located in the geographic region and generates a first query to the second computing device. The server receives additional item data based on a physical presence of the item in the geographic region from the second computing device. The server updates attributes data of the item in the database with the additional item data received from the second computing device.
G06F 16/909 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p.ex. la localisation
G06F 16/9537 - Recherche à dépendance spatiale ou temporelle, p.ex. requêtes spatio-temporelles
G06F 16/387 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des informations géographiques ou spatiales, p.ex. la localisation
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
Systems and methods provide for a network address management system for generating consistent network addresses to computing resources and for developing applications that are resilient to changes in the network addresses to those resources. In an embodiment, a consumer application executing on a computing system can receive a network address schema for a provider application via a library. The library may include a function for constructing a network address to the provider application. The consumer application can invoke the function to begin building the network address. The computing system/library extract context information at the time the consumer application invokes the build function, augment the context information using a selected application namespace (e.g., network address patterns and rules), and generate the network address using the augmented context information, patterns, and rules.
G06F 16/951 - Indexation; Techniques d’exploration du Web
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
A network service or application can receive dietary goals or conditions for a user or group of users. The network can determine threshold dietary amounts that users can receive over a predetermined time period to satisfy the goals or conditions. The network can monitor user consumption over the predetermined time period by collecting data from heterogeneous data streams (e.g., data associated with different structures, data types, types of data store, sources, processing rates, etc.), processing the data, storing the data using a distributive processing framework, and exposing optimized views into the data to provide smart virtual shopping cart functionality. The network can evaluate user consumption and food items placed into a virtual shopping cart to determine whether purchasing the items satisfy the thresholds, and if not, issue warnings, provide recommendations for substitute food items, and/or take other appropriate actions.
A machine may be configured to provide an online pluggable three-dimensional platform for publication of three-dimensional representations of items. For example, the machine generates a first software unit that corresponds to the three-dimensional representation of the item, and a second software unit that corresponds to an online three-dimensional platform that is pluggable to include the three-dimensional representation of the item corresponding to the first software unit. The online three-dimensional platform includes one or more pluggable slots for receiving one or more three-dimensional representations of one or more items. The machine generates an enhanced user interface on the client device based on causing an execution of the first software unit and the second software unit. The causing of the execution results in a display, in the enhanced user interface of the client device, of the three-dimensional representation of the item plugged into a pluggable slot of the online three-dimensional platform.
G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
Methods, systems, and media for lot classification are disclosed. In one example, a classification system for identifying lot listings receives a description for a listing in a publication system, identifies a string in the listing, identifies a quantity word or digit in the string, and converts an identified quantity word into digit form. A normalized string is tokenized to produce tokens, the tokenizing of the normalized string including splitting the normalized string into a series of substrings using a sequence of delimiters. For each substring, an additional split is performed by separating any digit from any other adjacent character, unless that character is another digit, and maintaining an internal character order of each split substring to produce a flattened list of tokenized tokens.
Methods, systems, and media for improving computer security and performance of security are disclosed. In one example, a computer security system comprises a key management monitor, and two key elements comprising a first key element and a second key element. The first key element is stored at a first location address within a computer memory and the second key element is stored at a second location address. The key management monitor is configured to determine or receive a time duration for performing a data dump of contents of the computer memory. In one example, the key management monitor is further configured to control a location of the first key element within the computer memory, wherein the location address of the first key element is changed within a time period that is less than the time duration for performing the data dump of contents of the computer memory.
G06F 21/52 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données
G06F 12/14 - Protection contre l'utilisation non autorisée de mémoire
G06F 21/75 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du calcul ou du traitement de l’information par inhibition de l’analyse de circuit ou du fonctionnement, p.ex. pour empêcher l'ingénierie inverse
H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
85.
GENERATING PHYSICAL PRODUCT CUSTOMIZATION PARAMETERS BASED ON MULTIPLE DISPARATE SOURCES OF COMPUTING ACTIVITY
An enhanced product customization service to automatically generate product customization parameters for customizing a product for a user in accordance with an interest of the user. Signals received from various sources are analyzed to identify an interest of the user and search queries that are generated by the user are also analyzed to identify an intention of the user to acquire a product. Then, based on having identified both the interest of the user and the intention of the user to acquire the product, product customization parameters are generated for customizing a physical characteristic of the product in accordance with the identified interest. In this way, embodiments of the enhanced product customization service may be deployed to customize a product for a user preemptively even without the user expressly indicating a specific interest in such a customized product.
An enhanced product recommendation service observes a user engaging in an activity to automatically recommend products that facilitate performance of the activity. Photographs and/or video of user performing the activity may be analyzed to identify an output that results from the activity and/or an activity task sequence that includes multiple tasks associated with completing the activity. Then, the enhanced product recommendation service may identify a product that is usable to generate the output(s) of the activity and/or complete the activity without performing one or more individual tasks of the activity task sequence. The product may be an existing product. Alternatively, the product may be a customized product that is designed based on observing the user engage in the activity. Physical measurements of the customized product may be determined based on various measurements determined by analyzing the photographs and/or video of the user performing the activity.
An attribute correlation system reduces network traffic and processing cycles associated with impromptu item selections by generating attribute preference models based on disparate attribute spectrums. The attribute correlation system deploys the attribute preference models to select individual items from various disparate "candidate item categories." Generally described, the attribute preference models facilitate analyzing item sets across a wide variety of disparate "candidate" item categories to preemptively identify individual items for a user. In this way, the individual items may be identified and, ultimately, selected for the user even absent any indication that the user has searched for otherwise identified these items or even other items from within the disparate "candidate" item categories. The "candidate" item categories may be determined to be disparate from one another based on a relationship void existing such that predefined relationships are missing between these "candidate" item categories.
Various implementations described herein are able to leverage the interaction from one or more potential buyers relative to a digital image to automatically create a sales listing for items that appear to be of interest to the buyers. This reduces or eliminates all together the manual effort previously required of sellers in researching and collecting data on each item they wish to sell. Because of their technical nature, the innovative solutions described herein are also readily scalable which, in turn, greatly improves the seller's experience. Based on buyer interaction experiences, sales listings for each item for sale can be automatically created and listed.
G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
89.
AUGMENTED REALITY, COMPUTER VISION, AND DIGITAL TICKETING SYSTEMS
Augmented reality, computer vision, and digital ticketing system techniques are described that employ a location determination system. In one example, the location determination system is configured to receiving at least one digital image as part of a live camera feed, identify an object included in the at least one digital image using object recognition, determine a location of the object in relation to a digital map of a physical environment, generate augmented reality digital content indicating the determined location in relation to the digital map, and render the augmented reality digital content as part of the live camera feed for display by a display device.
Artificial assistant system notification techniques are described that overcome the challenges of conventional search techniques. In one example, a user profile is generated to describe aspects of products or services learned through natural language conversations between a user and an artificial assistant system. These aspects may include price as well as non-price aspects such as color, texture, material, and so forth. To learn the aspects, the artificial assistant system may leverage spoken utterances and text initiated by the user as well as learn the aspects from digital images output as part of the conversation. Once generated, the user profile is then usable by the artificial assistant system to assist in subsequent searches.
Technologies are shown for content distribution on a blockchain involving generating a content distribution data block on a content distribution data blockchain, that stores digital content, data identifying the digital content, an owner identifier, an access holder identifier, and a use conditions attribute for identifying use requirements for the digital content. A use requirement is defined in the use conditions attribute. An owner identified in the owner identifier sets the access holder identifier to an identifier for a user entity. An access request is received from the user entity and, in response, whether a current use condition of the user entity satisfies the use requirement in the use conditions attribute is verified. If it is verified that the current use condition of the user entity satisfies the use requirement in the use conditions attribute, the digital content is distributed to the first user entity.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
92.
USER CONTROLLED STORAGE AND SHARING OF PERSONAL USER INFORMATION ON A BLOCKCHAIN
Technologies are shown for secure management of personal information data involving storing personal information data in a personal information data block and committing the personal information data block to a personal information data blockchain and authorizing access to the personal information data by a platform entity by storing a platform identifier corresponding to the platform entity in authorized access data. An access request is received from the platform entity that includes the platform identifier for the first platform entity. If the platform identifier is verified to be in the authorized access data, the personal information data is obtained from the personal information data blockchain and returned to the platform entity. In some examples, the authorized access data includes permissions that identify portions of the personal information data that the platform entity can access. In other examples, the authorized access data is secured on an authorized access data blockchain.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
93.
SECURE MANAGEMENT OF DATA FILES USING A BLOCKCHAIN
Technologies are shown for secure management of a data file secured on a data file management blockchain that involve generating a genesis block for a data file management blockchain that contains a data file to be managed and signing the genesis block to commit the genesis block to the data file management blockchain. One or more transaction data blocks are generated for the data file management blockchain that each include a modification to the data file and the blocks are signed to commit them to the blockchain. In some examples, the modifications describe changes to the data file and the transaction data blocks are traced to the genesis block and a current data file generated by applying the modifications on the transaction data blocks to the data file in a sequence determined by an order of the one or more transaction data blocks in the data file management blockchain.
G06F 21/10 - Protection de programmes ou contenus distribués, p.ex. vente ou concession de licence de matériel soumis à droit de reproduction
H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
A user may use a client device to create a draft document by interacting with a server. The server may send a message to a second device (e.g., using the short message service (SMS)). The message may prompt the user to respond with a message (e.g., a multimedia messaging service (MMS) message) that includes an image to be added to the draft. The server receives the image and modifies the draft (e.g., by updating a web page being displayed on the client device). This process allows the user to type text for a draft using a client device that includes a keyboard (e.g., a desktop or laptop computer) and to add an image to the draft using a second device that includes a camera (e.g., a mobile phone or tablet computer) without having to transfer the image from the second device to the first device.
Techniques are shown for key management using a traceable key block-chain ledger involving creating a cryptographic key at a key source, generating a genesis block for a key block-chain ledger corresponding to the cryptographic key, and securely modifying the genesis block to include metadata describing the key source. The techniques also involve performing a first key transaction with the cryptographic key, generating a first transaction block corresponding to the first key transaction with the cryptographic key and adding the first transaction block to the key block-chain ledger, and securely modifying the first transaction block to include metadata describing the first key transaction with the cryptographic key.
A bot framework receives a request message for data maintained by at least one of a plurality of autonomous data sources, and determines, based on a knowledge graph, a relationship between a first data set maintained by a first autonomous data source and a second data set maintained by a second autonomous data source. The bot framework transmits a first request to the first autonomous data source for a first set of corporate data using a first API, In response to receiving the first set of corporate data, the bot framework transmits a second request to the second autonomous data source for a second set of corporate data based on the first set of corporate data. The second request is transmitted using a second API. In response to receiving the second set of corporate data, the bot framework generates and transmits a response to the request message.
Computer vision and image characteristic search is described. The described system leverages visual search techniques by determining visual characteristics of objects depicted in images and comparing the determined characteristics to visual characteristics of other images, e.g., to identify similar visual characteristics in the other images. In some aspects, the described system performs searches that leverage a digital image as part of a search query to locate digital content of interest. In some aspects, the described system surfaces multiple user interface instrumentalities that include images of patterns, textures, or materials and that are selectable to initiate a visual search of digital content having a similar pattern, texture, or material. The described aspects also include pattern-based authentication in which the system determines authenticity of an item in an image based on a similarity of its visual characteristics to visual characteristics of known authentic items.
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
Computer vision for unsuccessful queries and iterative search is described. The described system leverages visual search techniques by determining visual characteristics of objects depicted in images and describing them, e.g., using feature vectors. In some aspects, these visual characteristics are determined for search queries that are identified as not being successful. Aggregated information describing visual characteristics of images of unsuccessful search queries is used to determine common visual characteristics and objects depicted in those images. This information can be used to inform other users about unmet needs of searching users. In some aspects, these visual characteristics are used in connection with iterative image searches where users select an initial query image and then the search results are iteratively refined. Unlike conventional techniques, the described system iteratively refines the returned search results using an embedding space learned from binary attribute labels describing images.
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes
99.
COMPUTER VISION USER SEGMENT, AND MISSING ITEM DETERMINATION
Techniques and systems are described that leverage computer vision as part of search to expand functionality of a computing device available to a user and increase operational computational efficiency as well as efficiency in user interaction. In a first example, user interaction with items of digital content is monitored. Computer vision techniques are used to identify digital images in the digital content, objects within the digital images, and characteristics of those objects. This information is used to assign a user to a user segment of a user population which is then used to control output of subsequent digital content to the user, e.g., recommendations, digital marketing content, and so forth.
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes
Improved access of a multidimensional database can be implemented using a space-filling curve, such as a z-order curve, and a tree structure. A state engine is configured to track the state of the dimensions of the database as the tree structure is traversed. Different states allow optimizations such as avoidance of analyzing a dimension for further nodes of the tree and removal of multiple nodes in a sub-tree.