Data processing: artificial intelligence – Machine learning
Reexamination Certificate
2006-12-20
2010-02-02
Vincent, David R (Department: 2129)
Data processing: artificial intelligence
Machine learning
C706S061000, C707S793000, C707S793000
Reexamination Certificate
active
07657493
ABSTRACT:
Personal data mining mechanisms and methods are employed to identify relevant information that otherwise would likely remain undiscovered. Users supply personal data that can be analyzed in conjunction with data associated with a plurality of other users to provide useful information that can improve business operations and/or quality of life. Personal data can be mined alone or in conjunction with third party data to identify correlations amongst the data and associated users. Applications or services can interact with such data and present it to users in a myriad of manners, for instance as notifications of opportunities.
REFERENCES:
patent: 5263165 (1993-11-01), Janis
patent: 5537404 (1996-07-01), Bentley et al.
patent: 6064656 (2000-05-01), Angal et al.
patent: 6195683 (2001-02-01), Palmer et al.
patent: 6209039 (2001-03-01), Albright et al.
patent: 6226260 (2001-05-01), McDysan
patent: 6341127 (2002-01-01), Katsube et al.
patent: 6434532 (2002-08-01), Goldband et al.
patent: 6469991 (2002-10-01), Chuah
patent: 6496482 (2002-12-01), Kubota
patent: 6628770 (2003-09-01), Jain et al.
patent: 6707820 (2004-03-01), Arndt et al.
patent: 6745224 (2004-06-01), D'Souza et al.
patent: 6820070 (2004-11-01), Goldman
patent: 6917975 (2005-07-01), Griffin et al.
patent: 6961318 (2005-11-01), Fichou et al.
patent: 7002926 (2006-02-01), Eneboe et al.
patent: 7065041 (2006-06-01), Sen
patent: 2001/0047355 (2001-11-01), Anwar
patent: 2002/0124053 (2002-09-01), Adams et al.
patent: 2003/0093792 (2003-05-01), Labeeb
patent: 2003/0105734 (2003-06-01), Hitchen et al.
patent: 2003/0115105 (2003-06-01), Lin
patent: 2003/0229623 (2003-12-01), Chang et al.
patent: 2004/0076160 (2004-04-01), Phaltankar
patent: 2004/0098456 (2004-05-01), Kryzanowski et al.
patent: 2005/0138419 (2005-06-01), Gupta et al.
patent: 2005/0238024 (2005-10-01), Taylor et al.
patent: 2005/0262132 (2005-11-01), Morita et al.
patent: 2005/0289234 (2005-12-01), Dai et al.
patent: 2006/0020700 (2006-01-01), Qiu et al.
patent: 2006/0031518 (2006-02-01), Jennings
patent: 2006/0036904 (2006-02-01), Yang
patent: 2006/0048224 (2006-03-01), Duncan et al.
patent: 2006/0062161 (2006-03-01), Tang et al.
patent: 2006/0123005 (2006-06-01), Burnett et al.
patent: 2007/0106754 (2007-05-01), Moore
patent: 2008/0154698 (2008-06-01), Flake
patent: 2008/0215428 (2008-09-01), Ramer
patent: 2005022826 (2006-10-01), None
Stohr, Recommendation Systems: Decision Support for the Information Economy, 1998.
Srivastava, et al., Web Usage Mining: Discovery and Applications of Usage Patterns from Web Data http://www.sigkdd.org/explorations/issues/1-2-2000-01/srivastava.pdf. Last accessed on Nov. 28, 2008, 12 pages.
News Room http://www.democraticmedia.org/book/export/html/28. Last accessed on Nov. 28, 2008, 153 pages.
Letters to the Editor http://letters.computing.co.uk/security/index.html. Last accessed on Nov. 28, 2008, 46 pages.
Brunner, et al. “Disruption Tolerant Networking” Dagstuhl Seminar Proceedings (2005) NEC Europe Ltd., Network Labooratories, 4 pages.
Fox, et al. “Towards Flexible Messaging for SOAP Based Services” (2004) IEEE, 11 pages.
Gunduz, et al. “A Framework for Aggregation Network Performance in Distributed Brokering Systems” (2000) Deptartment of Electrical Engineering & Computer Science, Syracuse University, 11 pages.
Chekuri, et al. “Building Edge-Failure Resilient Networks” (2002) Lucent Bell Labs, 18 pages.
Hota, et al. “Restoration of Virtual Private Networks with QoS Guarantees in the Pipe Model” (2004) GESTS International Transaction on Computer Science and Engineering, vol. 6 and No. 1, Journal ISSN No. 1738-6438, 12 pages.
Brightwell, et al. “Reserving Resilient Capacity in a Network” (2003) Networks 41, No. 2, 20 pages.
Duffield, et al. “A Flexible Model for Resource Management in Virtual Private Networks” (1999) ACM SIGCOMM Computer Communication Review vol. 29 , Issue 4, 14 pages.
Create Buzz Marketing & Word of Mouth Marketing Campaigns. 2004-2005 Buzzoodle, A Liquid Learning Inc. Company. http://www.buzzoodle.com. Last accessed Sep. 20, 2006.
Seth Godin. Unleashing the Ideavirus. Do You Zoom, Inc., 2000.
James Surowiecki. The Wisdom of Crowds. Doubleday, 2004.
Sandhu, et al. Access Control: Principles and Practice. IEEE Communications Magazine, Sep. 1994.
System Management Concepts: Operating System and Devices, http://www.dlib.indiana.edu/doc—link/en—US/a—doc—lib/aixbman/admnconc/audit.htm. Last accessed Sep. 20, 2006.
Hughes, et al. Automated Verification of Access Control Policies. http://www.cs.ucsb.edu/˜bultan/publications/tech-report04.pdf. Last accessed Sep. 20, 2006.
Cederquist, et al. An Audit Logic for Accountability. 2005. http://www.citebase.org/fulltext?format=application/pdf&identifier=oai:arXiv.org:cs/0502091. Last accessed Sep. 20, 2006.
Bergstraesser Thomas F.
Blinn Arnold N.
Brumme Christopher W.
Cheng Lili
Connolly Michael
Brown, Jr. Nathan H
Lee & Hayes PLLC
Microsoft Corporation
Vincent David R
LandOfFree
Recommendation system that identifies a valuable user action... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Recommendation system that identifies a valuable user action..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Recommendation system that identifies a valuable user action... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4178220