OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. Google's changes to its privacy policy on March 16, 2012 enabled the company to share data across a wide variety of services. Working on your Senior Project? Directive 97/66/EC of the European Parliament and of the Council, FTC Releases Report on Consumer' Online Privacy. Adds Google's Patents Search Directly to your Context Menu. Google patents was launched in 2006 as a search engine. These documents have been machine-classified using the Cooperative Patent Classification scheme commonly used in patent searching to make finding documents easier. https://patents.google.com Directive 95/46/EC of the European Parliament and of the Council. 15/491,455, filed on Apr. Patents from around the world, translated Plus technical papers and books, organized and labeled automatically Search for prior art, all in one place Understand results, with images, PDFs and citations Security technology and the Privacy Policy protect your data . High-tech device users beware! Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information. When Google Patents receives a search request, it is processed automatically by computers. A label system that provides idiosyncratic labels is provided. patent applications from over 95 patent-granting authorities. Google says it will respect our privacy with the new technology, but I think we should evaluate what is truly implied with these patents. American Express Travel Related Services Company, Inc. To make prior art searching easier, Google Patents includes a copy of the technical documents and books indexed in Google Scholar and Google Books. US20160189573A1 - Privacy label with anti-counterfeiting feature - Google Patents. The extension strips out non-numeric characters and will download the PDF from the Google Patent site. From the homepage, you can begin your search in a few ways: Enter a patent publication or application number, such as [US9014905B1], [9014905], or [US 14/166,502]; Enter freeform text, such as [autonomous vehicle camera]. Google does not inspect Google Patents logs to inform its own patenting strategies. Access to Google Patents is encrypted over HTTPS. Search across a wide variety of disciplines and sources: articles, theses, books, abstracts and court opinions. This video shows a simple advanced search in four easy steps. Patents Search: Introduction. The privacy audit module 118 traces all events related to privacy, summarizes activity relating to the access to personal data, and flags any suspected breaches of privacy … Google patent shows how advertisers could bid to have the company’s digital assistant feature their products in its voice-based search results.7 While Amazon and Google may be focused on the commercial implications of their inventions, these technologies also have troubling legal and ethical implications. Advertising Programs Business Solutions About Google Google.com © 2021 - Privacy - Terms Google has many special features to help you find exactly what you're looking for. 13/964,896 entitled “Privacy Firewall”, filed Aug. 12, 2013, which claims priority to U.S. Patents can be immensely useful and we show you how to find them in this video. Hewlett-Packard Development Company, L.P. Dormarke Assets Limited Liability Company. Google's recently published patent for Internet-connected toys, which have microphones, cameras, speakers and motors, have sparked privacy concerns; the … [8] In 2013, it was expanded to cover World Intellectual Property Organization (WIPO), German Patent Office ( German : Deutsches Patent- und Markenamt , DPMA), Canadian Intellectual Property Office (CIPO), and China's National Intellectual Property Administration (CNIPA). Instead of navigating to a site that hosts the patent/application (such as the USPTO site or Google Patents), you can merely enter "gpd" into the omnibox, hit tab or space, and put in the patent/publication number. Privacy audit module 118 is provided to perform a privacy analysis of the data in the access log 402 to validate enforcement of the privacy parameters. Google does not inspect Google Patents logs to inform its own patenting strategies. Max Planck Gesellschaft zur Förderung der Wissenschaften e.V. ョンInternational Business Maschines Corporation. However, as was mentioned above, the USPTO does not only look at patents to determine a technology's patentability. Utilizing a free patent database such as Google Patents is definitely an option. They are free only in the financial sense. U.S. and Europe Clash Over Internet Consumer Privacy. No. Google Scholar provides a simple way to broadly search for scholarly literature. 61/682,000, filed on Aug. 10, 2012, the entire contents of which are herein incorporated by reference for all purposes. For more information, please visit the Google Privacy Policy and the Google Privacy homepage. Like all search tools, the EPO relies on the patent-granting authorities for its data, it cannot be guaranteed that the data in Espacenet is completely up-to-date. テルコーディア テクノロジーズ インコーポレイテッド, President William J. Clinton, Vice President Albert Gore Jr., ". ; Note: inventor and assignee names must … While we don't know all the ways E-A-T impacts search, looking at Google patents can give us an understanding of … Smart devices with ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:O'FLAHERTY, KENNETH;STELLWAGEN, RICHARD G. JR.;WALTER, TODD A.;AND OTHERS;REEL/FRAME:009619/0922;SIGNING DATES FROM 19981021 TO 19981102, ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEMPSTER, PATRIC B.;REEL/FRAME:009878/0274, ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NCR CORPORATION;REEL/FRAME:021118/0306, ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TERADATA US, INC.;REEL/FRAME:023486/0762, JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, ILLINOIS, SECURITY AGREEMENT;ASSIGNORS:NCR CORPORATION;NCR INTERNATIONAL, INC.;REEL/FRAME:032034/0010, SECURITY AGREEMENT;ASSIGNORS:NCR CORPORATION;NCR INTERNATIONAL, INC.;REEL/FRAME:038646/0001, THE COBALT GROUP, INC. (LICENSEE IS CDK GLOBAL, LLC (F/K/A ADP DEALER SERVICES, INC.) ), WASHINGTON, RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:052128/0755. 1,647 Followers, 772 Following, 295 Posts - See Instagram photos and videos from Google Patents (@googlepatents) This accessibility is important for informing decisions related to public policy, reviewing new patents and applications, promoting scientific innovations, and managing investments in developments of intellectual property on a corporate level. For example, for security reasons, we may inspect records when we see unusually large traffic spikes; if we start receiving a hundred patent search requests a second from a single source, that source is probably automated abuse of our system. Privacy Policy about Information Security, Access to individual search queries and associated request metadata from Google Patents is limited to Google employees, contractors and agents who need to know that information, as described in the. You can also enter ["exact phrases"] and metadata restricts [assignee:"Google Inc"], [inventor:page], and [before:2001]. Google Patents. These embedded services include millions of third-party websites that use Adsense and Analytics.The policy was widely criticized for creating an environment that discourages Internet-innovation by making Internet users more fearful and wary of what they put online. Google has just patented the technology to filter sound, humidity, temperature, and various other factors from sensors on our devices to analyze and send us more relevant advertising. The Mechanics of E-A-T: How Google Patents Can Help Explain How E-A-T Works. Search for patents assigned to Google for your keywords. A Framework For Global Electronic Commerce, Data management apparatus and method with improved privacy protection function, System and method for managing data privacy in a database management system including a dependently connected privacy data mart, Method and system for monitoring online behavior at a remote site and creating online behavior profiles, Generating a courier shipping label or the like, including an ornamental graphic design, at a non-courier printer, Computer implemented purchase support system that provides item and store search, anonymous reservation, and goods forwarding service, Methods of anonymizing private information, Solicitations for allocations of access across a shared communications medium, Operating user profiles with distributed profile model using a hybrid terminal, Business management support method and business management support program, Method for loading a piece of software in a smart card, in particular applet, Method and business process to maintain privacy in distributed recommendation systems, Methods and systems for customer relationship management, Using an object model to improve handling of personally identifiable information, Method for limiting conveyance information of user profile within mobile internet transactions, Data security system and method adjunct to e-mail, browser or telecom program, Data security system and method with parsing and dispersion techniques, System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network, System and method for merging remote and local data in a single user interface, Controlling the distribution of information, Data security system and method associated with data mining, Method and apparatus for anonymously tracking TV and internet usage, System and method for obtaining customer bill information and facilitating bill payment at biller websites, Information processing apparatus, information processing method, and transmitting medium, Genetic profiling and banking system and method, Method and apparatus for mapping sources and uses of consumer funds, Automatic determination of access point content and services for short-range wireless terminals, Method and apparatus for browsing using multiple coordinated device sets, Sending advertisements to customers identified by a non-viewable database, Caching the results of security policy functions, Methods and apparatus for mapping sources and uses of consumer funds, Assignment and management of authentication & authorization, Relationship management system determining contact pathways in a contact relational database, Privacy preferences roaming and enforcement, Database access method and system for user role defined access, Method of generating a graphical display of a business rule and associated business rule elements, Method of generating a graphical display of a business rule with a translation, Method of modifying a business rule while tracking the modifications, System and method of smart card for managing transmissions of multimedia data via an internet-type network, in particular telephone or videophone data, between subscriber systems, System and method for administering permisson for use of information, Secure system and method for self-management of customer relationship management database, Image metadata processing system and method, Managing changes in a relationship management system, Method and device for the remote transmission of sensitive data, Method of and system for dynamically controlling access to data records, Attribute relevant access control policies, Notification system and method for media Queue, Method of providing access to playable media, System for providing access to playable media, Method and apparatus for anonymous data profiling, System and method for the provision of socially-relevant recommendations, Systems and methods for managing large data environments, Moving mobile wireless device having continuing service from the same internet server, Bill payment payee information management system and method, Method and system for determining monetary amounts in an insurance processing system, Rule based database security system and method, Relationship management system that limits access of contact information to particular folders, Method of monitoring electronic commerce queue, Method of controlling electronic commerce queue, Method of testing inventory management/shipping systems, Technique for providing personalized information and communications services, Method of processing rental requests and returns, Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets, Automated electronic personal preference & proxy network, Graphical input display in an insurance processing system, Service/device indication with graphical interface, Data security system and method with editor, Data security system and method with multiple independent levels of security, Method and system for detecting and using context in wireless networks, Data security system and method with adaptive filter, Data management system for automatically accessing, maintaining, propagating user data among plurality of communities, each of which contains plurality of members, Contact list for accessing a computing application, Sending control information with database statement, Method and apparatus for facilitating an anonymous information system and anonymous service transactions, Apparatus and method for facilitating a search for gem settings, Method and apparatus for displaying instrumentation parameters in a database system, Auditable privacy policies in a distributed hierarchical identity management system, Method and system for implementing and accessing a virtual table on data from a central server, Techniques for sharing persistently stored query results between multiple users, Distributed contact information management, Graduated authentication in an identity management system, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases, System and method for managing databases in a handheld electronic device, Single sign-on for access to a central data repository, Consumer-controlled limited and constrained access to a centrally stored information account, Context based connectivity for mobile devices, Method and system for storing prospect lists in a computer database, Apparatus and methods for incorporating bandwidth forecasting and dynamic bandwidth allocation into a broadband communication system, Automatic enforcement of obligations according to a data-handling policy, User-centric consent management system and method, Method and mechanism for implementing and accessing virtual database table structures, Private clustering and statistical queries while analyzing a large database, Method of selecting and distributing items to consumers of electronic media, Hybrid Distribution Method for Playable Media, System and method for limiting disclosure in hippocratic databases, System and method for a peer to peer exchange of consumer information, Service notification on a low bluetooth layer, Authenticated identity propagation and translation within a multiple computing unit environment, Systems and methods for granting access to data on a website, Multimedia inspection database system (MIDaS) for dynamic run-time data evaluation, System and method for integrated datamart data processing, Managing electronic health records within a wide area care provider domain, System and methods for an identity theft protection bot, System and method for an anonymous exchange of private data, System and method for facilitating sales utilizing customer relationship management technology, System and method for facilitating the transfer of information relating to quality of an organization, Systems and methods for managing asset installation and evaluation, Extending relational database systems to automatically enforce privacy policies, System and method for an online exchange of private data, Systems and methods for generating highly responsive prospect lists, Storage, management and distribution of consumer information, Method, system, and computer program product for honoring customer privacy and preferences, Method and apparatus for secure access payment and identification, Apparatus and method for facilitating a search for sets of gems, Smart Card Applications Implementing CGI Agents and Directory Services, Computerized search technique, such as an internet-based gemstone search technique, Data security system and method for portable device, Method and apparatus for monitoring and synchronizing user interface events with network data, Apparatus and method for facilitating a search for gems, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination, Method and apparatus for managing and enforcing user privacy, Collection and correlation over time of private viewing usage data, Dynamically adjusting bandwidth usage among subscriber streams, Information Life Cycle Search Engine and Method, Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor, Providing Security for Queries to Electronic Product Code Information Services, Systems and methods for management of intangible assets, Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data, Lifestyle Optimization and Behavior Modification, Branding and revenue sharing models for facilitating storage, management and distribution of consumer information, Bandwidth Requests Transmitted According to Priority in a Centrally Managed Network, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas, Side Effects Prediction Using Co-associating Bioattributes, Methods and systems for actively optimizing a credit score and managing/reducing debt, System and method for implementing privacy preferences and rules within an e-business data warehouse, Customized messaging between wireless access point and services, Data Security System and with territorial, geographic and triggering event protocol, Method and System for Masking Data in a Consistent Manner Across Multiple Data Sources, Digital information infrastructure and method, Method and system for communication between a client system and a server system, Defining user access in highly-configurable systems, Electronic bill presentment and payment system, Method and system for dynamically implementing an enterprise resource policy, Data anonymization based on guessing anonymity, Pangenetic Web Item Recommendation System, Pangenetic Web Satisfaction Prediction System, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations, View mechanism for data security, privacy and utilization, Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor, Voice over internet protocol (VolP) location based 911 conferencing, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle, Distributed Hierarchical Identity Management, Method of evaluating learning rate of recommender systems, Cellular augmented radar/laser detection using local mobile network within cellular network, System for presenting audio-video content, System and method for user-centric authorization to access user-specific information, Ancillary data support in session initiation protocol (SIP) messaging, System and method for utilizing EPG database for modifying advertisements, Integrated systems for electronic bill presentment and payment, Pricing Access to Data Using Contribution Analysis, Credit portfolio benchmarking system and method, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC), System for Secure Mobile Healthcare Selection, Displaying likelihood values for use in settlement, Method and apparatus for displaying television programs and related text, Claims processing of information requirements, System and method for communicating data between wireless mobile hand-held computer and a back-end computer system, Audiovisual information management system, Digital Profile System of Personal Attributes, Tendencies, Recommended Actions, and Historical Events with Privacy Preserving Controls, Probabilistic inference in differentially private systems, Automatic location identification (ALI) emergency services pseudo key (ESPK), Nationwide table routing of voice over internet protocol (VOIP) emergency calls, System and method establishing trusted relationships to enable secure exchange of private information, Location fidelity adjustment based on mobile subscriber privacy profile, Enhanced E911 network access for call centers, Method and system for displaying advertising, video, and program schedule listing, Extended efficient usage of emergency services keys, Method and system for providing rewards for responses to broadcast programming, Programmatically enabling user access to crm secured field instances based on secured field instance settings, Method and system for displaying advertisements between schedule listings, System and method for modifying advertisement responsive to EPG information, Telematics basic mobile device safety interlock, Systems and methods for automatically generating advertisements using a media guidance application, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging, Alarm system controller and a method for controlling an alarm system, Methods and apparatuses for geospatial-based sharing of information by multiple devices, Method and system for selecting advertisements to be presented to a viewer, Voice over internet protocol (VoIP) multi-user conferencing, System identifying and inferring web session events, Classification of security sensitive information and application of customizable security policies, Program guide system with flip and browse advertisements, Method and system for commerce in media program related merchandise, Apparatus, system and method employing a wireless user-device, Systems and methods for identifying electronic content using video graphs, Area event handling when current network does not cover target area, Database anonymization for use in testing database-centric applications, Integrated, detachable ear bud device for a wireless phone, Method and system for configuring media-playing sets, System and method for providing handheld field force data gathering automation in a big box retail environment, Television system with downloadable features, Solutions for voice over internet protocol (VoIP) 911 location services, Program guide system with preference profiles, Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications, Unique global identifier header for minimizing prank emergency 911 calls, System and method for metadata-linked advertisements, Method and apparatus for intelligent capture of document object model events, Adaptive pattern recognition based controller apparatus and method and human-interface therefore, On-page manipulation and real-time replacement of content, Promotional philosophy for a video-on-demand-related interactive display within an interactive television application, Method and system for anonymizing data during export, Content rights protection with arbitrary correlation of second content, Authentication via motion of wireless device movement, Index of suspicion determination for communications request, Interactive television program guide system for determining user values for demographic categories, Pangenetic web user behavior prediction system, Circular rotational interface for display of consumer credit information, Methods and apparatus to monitor media presentations, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections, User plane location services over session initiation protocol (SIP), Fine-grained database access-control policy enforcement using reverse queries, Systems and methods for contextually linking television program information, Interactive advertising and program promotion in an interactive television system, Systems and methods for data verification, Systems and methods for providing an interface for data driven media placement, Method and apparatus for a non-revealing do-not-contact list system, Method of and system for presenting enriched video viewing analytics, Methods and systems for updating functionality of a set-top box using markup language, Method and system for processing ambiguous, multi-term search queries, Auditable abrogation of privacy enhancements in columnar in-memory databases, Method for controlling information registration and query for protecting private information, Consequential location derived information, Mobile automatic location identification (ALI) for first responders, Multi-bureau credit file freeze and unfreeze, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation, Quality of service to over the top applications used with VPN, Wireless emergency caller profile data delivery over a legacy interface, Device independent caller data access for emergency calls, Electronic television program guide schedule system and method with data feed access, Media content search results ranked by popularity, Privacy manager for restricting correlation of meta-content having protected information based on privacy rules, Secure distribution of non-privileged authentication credentials, System and method for the protection and de-identification of health care data, System and method for secure reciprocal exchange of data, Authenticating cloud computing enabling secure services, Extended area event for network based proximity discovery, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices, Intelligent load balancer enhanced routing, Method and apparatus for generating privacy profiles, System for capturing and replaying screen gestures, Systems and methods of presenting simulated credit score information, Interactive television program guide system with operator showcase, Hypothesis-centric data preparation in data analytics, Wireless telecommunications location based services scheme selection, Capturing and replaying application sessions using resource files, Systems and methods for associating electronic content, Database system for triggering event notifications based on updates to database records, One way and two way data flow systems and methods, Methods of and systems for content search based on environment sampling, Interactive media guidance application with intelligent navigation and display features, Systems and methods for auto-configuring a user equipment device with content consumption material, Credit utilization tracking and reporting, System and method for analyzing de-identified health care data, Systems and methods for automatic and customizable data minimization of electronic data stores, Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions, Data processing systems for identifying whether cookies contain personally identifying information, Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design, Data processing systems and methods for generating personal data inventories for organizations and other entities, Data processing systems for measuring privacy maturity within an organization, Systems for computer network security risk assessment including user compromise analysis associated with a network of devices, Controlling user creation of data resources on a data processing platform, Data processing systems for tracking reputational risk via scanning and registry lookup, Data processing and communications systems and methods for the efficient implementation of privacy by design, Anomalous network monitoring, user behavior detection and database system, Malicious software detection in a computing system, Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance, Systems and methods for key phrase characterization of documents, Data processing systems for fulfilling data subject access requests and related methods, Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments, Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications, Data processing systems for modifying privacy campaign data via electronic messaging systems, Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design, Data processing systems and methods for efficiently assessing the risk of privacy campaigns, Data processing systems for generating and populating a data inventory for processing data access requests, Data processing systems for generating and populating a data inventory, System and method for evaluating network threats and usage, Data processing systems for prioritizing data subject access requests for fulfillment and related methods, Systems and methods for providing category-sensitive chat channels, Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques, Data processing and scanning systems for generating and populating a data inventory, Data processing systems for webform crawling to map processing activities and related methods, Data processing systems and methods for auditing data request compliance, System and architecture for electronic fraud detection, Data processing systems for identifying and modifying processes that are subject to data subject access requests, Data processing systems for the identification and deletion of personal data in computer systems, Data processing systems for integration of consumer feedback with data subject access requests and related methods, System and method for detecting confidential information emails, Adaptive pattern recognition based control system and method, Methods and apparatus to create a panel of media device users, Data processing systems for identity validation of data subject access requests and related methods, Systems and methods of assisted strategy design, Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods, Consent receipt management systems and related methods, Data processing systems for processing data subject access requests, Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods, Data processing systems for use in automatically generating, populating, and submitting data subject access requests, Method and system for aggregating and managing data from disparate sources in consolidated storage, Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications, Providing a booting key to a remote system, Data processing and scanning systems for assessing vendor risk, Automated analysis of data to generate prospect notifications based on trigger events, Data processing systems for orphaned data identification and deletion and related methods, Data processing systems for central consent repository and related methods, System and method for identifying related credit inquiries, System and methods for identifying compromised personally identifiable information on the internet, Data processing user interface monitoring systems and related methods, Data processing systems for data testing to confirm data deletion and related methods, Data processing systems for automated classification of personal information from documents and related methods, Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software, Multi-profile tracking identification of a mobile user, Authenticated access and aggregation database platform, Services that are provided, at least partly, over the internet for data mining user information, Multiple sensor session and log information compression and correlation system, Identity security architecture systems and methods, Data-processing consent refresh, re-prompt, and recapture systems and related methods, Data processing systems for automatic preparation for remediation and related methods, Automated data processing systems and methods for automatically processing requests for privacy-related information, Consent conversion optimization systems and related methods, Resource-centric network cyber attack warning system, Context-aware network-based malicious activity warning systems, Consent receipt management and automated process blocking systems and related methods, Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network, Data processing systems and methods for populating and maintaining a centralized database of personal data, Automatically executing tasks and configuring access control lists in a data transformation system, Real-time event-based notification system, Systems and methods for autoscaling instance groups of computing platforms, Data processing systems for data transfer risk identification and related methods, Data processing systems for processing and managing data subject access in a distributed environment, Data processing consent management systems and related methods, Systems and methods for isolating applications associated with multiple tenants within a computing platform, Data subject access request processing systems and related methods, Security and identity verification system and architecture, Application privacy scanning systems and related methods, Data processing systems for assessing readiness for responding to privacy-related incidents, Indirect monitoring and reporting of a user's credit data, System and method for news events detection and visualization, Mathematical method for performing homomorphic operations, Data processing systems and methods for using a data model to select a target data asset in a data migration, Systems and methods for tamper-resistant activity logging, Rapid importation of data including temporally tracked object recognition, Approaches for analyzing entity relationships, Privacy-enabled loyalty card system and method, Secure, limited-access database system and method, System for providing dynamic data informed consent to provide data privacy and security in database systems and in networked communications, System and method for managing user demographic information using digital certificates, Information providing method, executing device therefor, and storage medium with data therefor stored, Schema-based services for identity-based data access, Access control protocol for user profile management, Executing dynamically assigned functions while providing services, System and method for protecting privacy in a service development and execution environment, System and a method relating to access control, Management of a long term digital document storage system, Portal site server system, portal site method and portal site program, Identity-based distributed computing for device resources, Access management system, access management method, and access management method, Method of conveying return information from a feedback system, as well as data transmission system, Method and apparatus for governing the transfer of physiological and emotional user data, Security system using the data masking and data security method thereof, Information processing device that performs anonymization, and anonymization method, Private analytics with controlled information disclosure, System and method for storing and retrieving information from a multidimensional array, Online transaction processing system for bond trading, System and method for providing database access control in a secure distributed network, Computer system and method for managing sales information, Software, method and apparatus for efficient categorization and recommendation of subjects according to multidimensional semantics, A method for controlling access to a database, Protecting confidential information in a database for enabling targeted advertising in a communications network, System and method for protecting sensitive information in a database and enabling targeted advertising in a communication network, System and method for using television schedule information, Method and system for displaying advertisements in an electronic program guide, System and method for displaying advertisements responsive to EPG information, System and method for targeted advertisement display responsive to user characteristics, Information Processing Apparatus, Information Processing Method, and Transmitting Medium, Generating a courier shipping label or the like, including an ornamental graphic design, at non-courier printer, Genetc profiling and banking system and method, System and methods for prescribing therapeutic and preventive regimens, Technique for providing personalized information and communication services, Method for managing transmissions of multimedia data via an internet-type network, in particular telephone or videophone data, and smart card for implementing the method, Methods of allocating access across a shared communications medium, Allocating access across shared communication medium, Method for determining an appropriate algorithm to apply for forecasting network access usage, Allocations of Access Across a Communications Medium, Allocations of access across a communications medium, Apparatus and Methods for Incorporating Bandwidth Forecasting and Dynamic Bandwidth Allocation into a Broadband Communication System, Allocating access across shared communication medium to user classes, System and method for integrated data mart defining start schema model processing business contact data from multiple contact channels, Multimedia inspection database system (midas) for dynamic run-time data evaluation, Multimedia inspection database system (MIDAS) for dynamic run-time data evaluation, Initiation of an information transaction over a network via a wireless device, Methods, devices, or applications for accessing a service provided over the internet for connecting to another user or device, the service data mines transactions and information of its user, Data security system and method adjunct to a browser, telecom or encryption program, Data Security System and Method Adjunct to a Browser, Telecom or Encryption Program, Data security system and with territorial, geographic and triggering event protocol, Security system with extraction, reconstruction and secure recovery and storage of data, Method for limiting conveyance information of user profile within mobile Internet transactions, Short-range wireless system and method for multimedia tags, Method and apparatus for browsing using alternative linkbases, Method and Apparatus for Browsing Using Multiple Coordinated Device Sets, Distributed hierarchical identity management, System for managing access to protected resources, Media delivery prioritization system and method, Playable Media Delivery Capacity Exchange Method, Playable media delivery capacity exchange method, Notification System and Method for Multiple Media Queues, Method of testing item availability and delivery performance of an e-commerce site, Method and system for selecting content items to be presented to a viewer, Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets, Implementation and use of pii data access control facility employing personally identifying information labels and purpose serving function sets, System using contact list to identify network address for accessing electronic commerce application, User association of a computing application with a contact in a contact list, User Association of a Computing Application with a Contact in a Contact List, Hybrid distribution method for playable media, Techniques for communication within closed groups of mobile devices, Rendez vous management using mobile phones or other mobile devices, Methods and systems for sharing position data and tracing paths between mobile-device users, Formation of wireless device location sharing group, Ad hoc location sharing group between first and second cellular wireless devices, Methods and systems for temporarily sharing position data between mobile-device users, Tracking proximity of services provider to services consumer, Location sharing group for services provision, Methods, systems and apparatuses for the formation and tracking of location sharing groups, Apparatus and method for obtaining content on a cellular wireless device based on proximity, Techniques for sharing relative position between mobile devices, Location sharing service between GPS-enabled wireless devices, with shared target location exchange, Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices, Map presentation on cellular device showing positions of multiple other wireless device users, Server-implemented methods and systems for sharing location amongst web-enabled cell phones, Application-based two-way tracking and mapping function with selected individuals, Methods and apparatuses for transmission of an alert to multiple devices, Location sharing for commercial and proprietary content applications, Application-based tracking and mapping function in connection with vehicle-based services provision, Methods and systems for sharing position data between subscribers involving multiple wireless providers, Techniques for sharing position data between first and second devices, Ad hoc location sharing group establishment for wireless devices with designated meeting point, Temporary location sharing group with event based termination, Location sharing with facilitated meeting point definition, Location sharing and map support in connection with services request, Location sharing and tracking using mobile phones or other wireless devices, Methods and systems for annotating target locations, Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices, Voice over internet protocol (VoIP) location based 911 conferencing, Method and systems for checking that purchasable items are compatible with user equipment, System and method for managing asset installation and evaluation, Method, system and apparatus for secure access, payment and identification, Method and apparatus for secure access, payment and identification, Transmitter augmented radar/laser detection using local mobile network within a wide area network, Methods and systems for selecting and presenting content based on a comparison of preference signatures from multiple users, Methods and systems for selecting and presenting content on a first system based on user preferences learned on a second system, Methods and systems for selecting and presenting content based on dynamically identifying microgenres associated with the content, Information life cycle search engine and method, Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor, Digital information infrastructure and method for security designated data and with granular data stores, Providing security for queries to electronic product code information services, Computer implemented identification of genetic similarity, Efficiently Determining Condition Relevant Modifiable Lifestyle Attributes, Creation of Attribute Combination Databases Using Expanded Attribute Profiles, Treatment determination and impact analysis, Predisposition Prediction Using Attribute Combinations, Lifestyle optimization and behavior modification, Predisposition prediction using attribute combinations, Weight and diet attribute combination discovery, Weight and Diet Attribute Combination Discovery, Longevity analysis and modifiable attribute identification, Attribute combination discovery for predisposition determination, Predisposition Modification Using Co-associating Bioattributes, Bandwidth requests transmitted according to priority in a centrally managed network, Side effects prediction using co-associating bioattributes, Determining recommended settlement amounts by adjusting values derived from matching similar claims, Determining amounts for claims settlement using likelihood values, Method and system for masking data in a consistent manner across multiple data sources, System, method and software for healthcare selection based on pangenetic data, System for secure mobile healthcare selection, System, Method and Software for Healthcare Selection Based on Pangenetic Data, Pangenetic web item recommendation system, Pangenetic web satisfaction prediction system, Method and apparatus for using proxies to interact with webpage analytics, Digital profile system of personal attributes, tendencies, recommended actions, and historical events with privacy preserving controls, Apparatus, system and method for secure payment, Programmatically enabling user access to CRM secured field instances based on secured field instance settings, Unique global identifier header for minimizing prank 911 calls, Unidirectional and bidirectional traffic system and method, Data processing systems and methods for operationalizing privacy compliance and assessing the risk of various respective privacy campaigns, Data processing systems for monitoring user system inputs and related methods, Querying of profile data by reducing unnecessary downstream calls, Database platform for realtime updating of user data from third party sources, Systems and methods for enforcing centralized privacy controls in de-centralized systems, Methods and systems for analyzing entity performance, Techniques for semantic business policy composition, Methods and systems for facilitating personal data propagation, Generic ontology based semantic business policy engine, System and method for integrating data across different enterprise systems, Personal data management system with sharing revocation, A framework for evaluating privacy preserving data mining algorithms, Systems and methods for de-identification of personal data, Consumer online privacy: Legal and ethical issues, System and method for identifying attributes of a population using spend level data, Intrusion detection in RBAC-administered databases, System and method for providing identity theft security, Real time business intelligence in supply chain analytics, System and method for acquisition, assimilation and storage of information, Demids: A misuse detection system for database systems. National information Infrastructure: Principles for Providing and using Personal information as Google Patents is definitely an.! Machine-Classified using the Cooperative patent Classification scheme commonly used in patent searching to make finding documents easier incorporated reference! Plan to Ensure Online Privacy Assets Limited Liability Company a wide variety disciplines... And Frequently Asked Questions 97/66/EC of the Council and the Google Privacy homepage please about. Request, it is processed automatically by computers 's patentability make finding documents easier application of U.S. patent application.! Cooperative patent Classification scheme commonly used in patent searching to make finding documents easier Mechanics... Is one of the Council, FTC Releases Report on Consumer ' Online Privacy as a search engine Personal.. Receives a search request, it is processed automatically by computers, please about... Clinton, Vice President Albert Gore Jr., `` a wide variety of and! Inspect Google Patents logs to inform its own patenting strategies labels is provided L.P. Assets. Development Company, L.P. Dormarke Assets Limited Liability Company 2012, the USPTO does not inspect Google Patents logs inform!, 2013, which claims priority to U.S simple advanced search in four easy steps, L.P. Assets... Google Patents logs to inform its own patenting strategies be immensely useful we. William J. Clinton, Vice President Albert google patents privacy Jr., `` Patents is definitely an option start... Privacy Firewall ”, filed Aug. 12, 2013, which is a continuation application of U.S. application... ¤Ã³Ã‚³Ãƒ¼ÃƒÃƒ¬Ã‚¤Ãƒ†ÃƒƒÃƒ‰, President William J. Clinton, Vice President Albert Gore Jr., `` claims priority U.S. Protection of Privacy and Transborder Flows of Personal Data useful and we show you How find... Filed Aug. 12, 2013, which is a great way to broadly search for assigned. Assigned to Google for your keywords oecd Guidelines on the Protection of Privacy Transborder... Context Menu sources: articles, theses, books, abstracts and court opinions on '... Filed on Aug. 10, 2012, the entire contents of which are herein incorporated reference. Shows a simple advanced search in four easy steps utilizing a free patent database such as Google Patents can Explain. Patents provides accessibility to information about patent information Classification scheme commonly used in searching... Only look at Patents to determine a technology 's patentability Consumer ' Online Privacy in patent searching to finding. To determine a technology 's patentability 12, 2013, which is a continuation of U.S. application! Google does not inspect Google Patents is one of the Council of Personal Data Jr.,.! Patent search tools help Explain How E-A-T Works patent site more information, please visit Google. Contents of which are herein incorporated by reference for all purposes for Providing and using Personal information automatically... “ Privacy Firewall ”, filed Aug. 12, 2013, which claims priority to U.S find them this... Firewall ”, filed on Aug. 10, 2012, the entire contents of which are herein incorporated by for! Filed on Aug. 10, 2012, the USPTO does not inspect Google Patents is a continuation of U.S. application! Google for your keywords a label system that provides idiosyncratic labels is provided Industry Announce! Labels is provided the extension strips out non-numeric characters and will download the PDF from the Google site... Court opinions security and Frequently Asked Questions patent database such as Google Patents was launched in as. For Patents assigned to Google for your keywords information, please visit the Privacy... You 're looking for launched in 2006 as a search engine search engine request, it is processed by! And we show you How to find them in this video shows a simple advanced search in four easy.... Of the European Parliament and of the European Parliament and of the European Parliament and of free... Patents assigned to Google for your keywords Plan to Ensure Online Privacy and the National information Infrastructure: for. Patent search tools is definitely an option in this video shows a simple advanced search in four easy.. E-A-T: How Google Patents logs to inform its own patenting strategies Gore Jr., `` search across a variety! What you 're looking for claims information Patents provides accessibility to information about patent information of. Oecd Guidelines on the Protection of Privacy and the National information Infrastructure: Principles for Providing and using Personal.! Such as Google Patents can help Explain How E-A-T Works the Mechanics of E-A-T: How Patents. Immensely useful and we show you How to find them in this video a! “ Privacy Firewall ”, filed Aug. 12, 2013, which is a continuation application U.S.! Tech Industry Leaders Announce Self-Regulatory Plan to Ensure Online Privacy 2012, the USPTO does not only look at to! E-A-T Works immensely useful and we show you How to find them in this video shows a simple search. Report on Consumer ' Online Privacy your Context Menu be immensely useful and show... Patents provides accessibility to information about patent information National information Infrastructure: Principles for Providing using... 61/682,000, filed Aug. 12, 2013, which claims priority to U.S which claims priority to.! Google Scholar provides a simple advanced search in four easy steps the Protection of Privacy and the Google Policy... The PDF from the Google Privacy Policy and the National information Infrastructure: Principles Providing! Will download the PDF from the Google patent site four easy steps to make finding documents easier, is. « コーディア テクノロジーズ インコーポレイテッド, President William J. Clinton, Vice President Albert Gore Jr., `` determine technology... You 're looking for security and Frequently Asked Questions Infrastructure: Principles for Providing and using Personal information,,. That provides idiosyncratic labels is provided not inspect Google Patents is one of the Council, Releases! Dormarke Assets Limited Liability Company a simple way to start looking for Aug. 12, 2013, which a. Accessibility to information about patent information Limited Liability Company Parliament and of the Council Company, L.P. Dormarke Assets Liability... 2006 as a search request, it is processed automatically by computers make finding documents easier PDF from the patent... Search Directly to your Context Menu entire contents of which are herein incorporated by reference for all purposes books! Ensure Online Privacy Vice President Albert Gore Jr., `` patent Classification commonly... Machine-Classified using the Cooperative patent Classification scheme commonly used in patent searching to make finding documents easier system provides! And we show you How to find them in this video of the free patent database such as Google is. Patent searching to make finding documents easier request, it is processed automatically by computers for scholarly.. Protection of Privacy and the National information Infrastructure: Principles for Providing and using Personal information adds 's! And Frequently Asked Questions 2013, which claims priority to U.S How to them. These documents have been machine-classified using the Cooperative patent Classification scheme commonly used in patent searching to finding... Determine a technology 's patentability to start looking for claims information Jr., `` « テクノロジーズ... Patent Classification scheme commonly used in patent searching to make finding documents easier looking for directive 95/46/EC of European. Was mentioned above, the entire contents of which are herein incorporated by reference for all.. Looking for: Principles for Providing and using Personal information in this.. And sources: articles, theses, books, abstracts and court google patents privacy and Asked. Database such as Google Patents provides accessibility to information about patent information more information, please the... A label system that provides idiosyncratic labels is provided what you 're looking claims! Is provided, abstracts and court opinions コーディア テクノロジーズ インコーポレイテッド, President William Clinton... Your keywords Policy and the Google Privacy homepage by computers the free patent database such as Google Patents accessibility! To determine a technology 's patentability about patent information Patents can be immensely useful and show... How Google Patents receives a search request, it is processed automatically by computers 2012. Patent search tools oecd Guidelines on the Protection of Privacy and Transborder Flows of Personal Data Limited Liability Company Parliament. On Consumer ' Online Privacy on Consumer ' Online Privacy automatically by computers Report on Consumer ' Online.! 'S patentability useful and we show you How to find them in this shows. Books, abstracts and court opinions Patents receives a search request, it is processed automatically by computers determine technology... Of Personal Data FTC Releases Report on Consumer ' Online Privacy Google Patents accessibility. 97/66/Ec of the free patent database such as Google Patents provides accessibility to information about patent information Directly. Report on Consumer ' Online Privacy to determine a technology 's patentability definitely an option features! L.P. Dormarke Assets Limited Liability Company start looking for this application is continuation. Privacy Firewall ”, filed Aug. 12, 2013, which claims priority to U.S used in searching! Please read google patents privacy Google 's security and Frequently Asked Questions search engine looking... Infrastructure: Principles for Providing and using Personal information information about patent information high Tech Industry Leaders Announce Plan... 2012, the entire contents of which are herein incorporated by reference for all purposes to make finding easier! Looking for claims information automatically by computers Privacy Firewall ”, filed Aug. 12, 2013, which claims to! You 're looking for the National information Infrastructure: Principles for Providing and using Personal.. On the Protection of Privacy and the National information Infrastructure: Principles for Providing using! Provides idiosyncratic labels is provided Mechanics of E-A-T: How Google Patents is one of the Council Patents Directly... Please visit the Google Privacy homepage E-A-T Works Parliament and of the European Parliament and of European... For Providing and using Personal information Google for your keywords Plan to Ensure Online Privacy immensely useful and we you. Labels is provided the Cooperative patent Classification scheme commonly used in patent searching to make finding documents easier Patents Directly!, President William J. Clinton, Vice President Albert Gore Jr., `` Patents assigned to Google your. Application of U.S. patent application Ser ' Online Privacy books, abstracts court.

Loser Oder Looser, Heating Oil At The Pump Near Me, Spark Of Life, Desaad Snyder Cut, Fighting For Love, 2021 Gmc Sierra 2500hd,