Search the world's information, including webpages, images, videos and more. High-tech device users beware! patent applications from over 95 patent-granting authorities. Working on your Senior Project? 61/682,000, filed on Aug. 10, 2012, the entire contents of which are herein incorporated by reference for all purposes. Google presenta una herramienta para buscar patentes El gigante de internet Google lanzó en modo de pruebas Google Patent Search, una nueva … ã§ã³ï¼©ï½ï½ï½ ï½ï½ï½ï½ï½ï½ï½ï½ï½ ï¼¢ï½ï½ï½ï½ï½ ï½ï½ ï¼ï½ï½ï½ï½ï½ï½ï½ ï½ ï¼£ï½ï½ï½ï½ï½ï½ï½ï½ï½ï½. Google Patents allows the user to search for patent documents from 23 jurisdictions, which are as follows United States, Europe, Japan, China, South Korea, ... Google and privacy are antithetical. A Framework For Global Electronic Commerce, Data management apparatus and method with improved privacy protection function, System and method for managing data privacy in a database management system including a dependently connected privacy data mart, Method and system for monitoring online behavior at a remote site and creating online behavior profiles, Generating a courier shipping label or the like, including an ornamental graphic design, at a non-courier printer, Computer implemented purchase support system that provides item and store search, anonymous reservation, and goods forwarding service, Methods of anonymizing private information, Solicitations for allocations of access across a shared communications medium, Operating user profiles with distributed profile model using a hybrid terminal, Business management support method and business management support program, Method for loading a piece of software in a smart card, in particular applet, Method and business process to maintain privacy in distributed recommendation systems, Methods and systems for customer relationship management, Using an object model to improve handling of personally identifiable information, Method for limiting conveyance information of user profile within mobile internet transactions, Data security system and method adjunct to e-mail, browser or telecom program, Data security system and method with parsing and dispersion techniques, System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network, System and method for merging remote and local data in a single user interface, Controlling the distribution of information, Data security system and method associated with data mining, Method and apparatus for anonymously tracking TV and internet usage, System and method for obtaining customer bill information and facilitating bill payment at biller websites, Information processing apparatus, information processing method, and transmitting medium, Genetic profiling and banking system and method, Method and apparatus for mapping sources and uses of consumer funds, Automatic determination of access point content and services for short-range wireless terminals, Method and apparatus for browsing using multiple coordinated device sets, Sending advertisements to customers identified by a non-viewable database, Caching the results of security policy functions, Methods and apparatus for mapping sources and uses of consumer funds, Assignment and management of authentication & authorization, Relationship management system determining contact pathways in a contact relational database, Privacy preferences roaming and enforcement, Database access method and system for user role defined access, Method of generating a graphical display of a business rule and associated business rule elements, Method of generating a graphical display of a business rule with a translation, Method of modifying a business rule while tracking the modifications, System and method of smart card for managing transmissions of multimedia data via an internet-type network, in particular telephone or videophone data, between subscriber systems, System and method for administering permisson for use of information, Secure system and method for self-management of customer relationship management database, Image metadata processing system and method, Managing changes in a relationship management system, Method and device for the remote transmission of sensitive data, Method of and system for dynamically controlling access to data records, Attribute relevant access control policies, Notification system and method for media Queue, Method of providing access to playable media, System for providing access to playable media, Method and apparatus for anonymous data profiling, System and method for the provision of socially-relevant recommendations, Systems and methods for managing large data environments, Moving mobile wireless device having continuing service from the same internet server, Bill payment payee information management system and method, Method and system for determining monetary amounts in an insurance processing system, Rule based database security system and method, Relationship management system that limits access of contact information to particular folders, Method of monitoring electronic commerce queue, Method of controlling electronic commerce queue, Method of testing inventory management/shipping systems, Technique for providing personalized information and communications services, Method of processing rental requests and returns, Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets, Automated electronic personal preference & proxy network, Graphical input display in an insurance processing system, Service/device indication with graphical interface, Data security system and method with editor, Data security system and method with multiple independent levels of security, Method and system for detecting and using context in wireless networks, Data security system and method with adaptive filter, Data management system for automatically accessing, maintaining, propagating user data among plurality of communities, each of which contains plurality of members, Contact list for accessing a computing application, Sending control information with database statement, Method and apparatus for facilitating an anonymous information system and anonymous service transactions, Apparatus and method for facilitating a search for gem settings, Method and apparatus for displaying instrumentation parameters in a database system, Auditable privacy policies in a distributed hierarchical identity management system, Method and system for implementing and accessing a virtual table on data from a central server, Techniques for sharing persistently stored query results between multiple users, Distributed contact information management, Graduated authentication in an identity management system, Use of proxy servers and pseudonymous transactions to maintain individual's privacy in the competitive business of maintaining personal history databases, System and method for managing databases in a handheld electronic device, Single sign-on for access to a central data repository, Consumer-controlled limited and constrained access to a centrally stored information account, Context based connectivity for mobile devices, Method and system for storing prospect lists in a computer database, Apparatus and methods for incorporating bandwidth forecasting and dynamic bandwidth allocation into a broadband communication system, Automatic enforcement of obligations according to a data-handling policy, User-centric consent management system and method, Method and mechanism for implementing and accessing virtual database table structures, Private clustering and statistical queries while analyzing a large database, Method of selecting and distributing items to consumers of electronic media, Hybrid Distribution Method for Playable Media, System and method for limiting disclosure in hippocratic databases, System and method for a peer to peer exchange of consumer information, Service notification on a low bluetooth layer, Authenticated identity propagation and translation within a multiple computing unit environment, Systems and methods for granting access to data on a website, Multimedia inspection database system (MIDaS) for dynamic run-time data evaluation, System and method for integrated datamart data processing, Managing electronic health records within a wide area care provider domain, System and methods for an identity theft protection bot, System and method for an anonymous exchange of private data, System and method for facilitating sales utilizing customer relationship management technology, System and method for facilitating the transfer of information relating to quality of an organization, Systems and methods for managing asset installation and evaluation, Extending relational database systems to automatically enforce privacy policies, System and method for an online exchange of private data, Systems and methods for generating highly responsive prospect lists, Storage, management and distribution of consumer information, Method, system, and computer program product for honoring customer privacy and preferences, Method and apparatus for secure access payment and identification, Apparatus and method for facilitating a search for sets of gems, Smart Card Applications Implementing CGI Agents and Directory Services, Computerized search technique, such as an internet-based gemstone search technique, Data security system and method for portable device, Method and apparatus for monitoring and synchronizing user interface events with network data, Apparatus and method for facilitating a search for gems, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination, Method and apparatus for managing and enforcing user privacy, Collection and correlation over time of private viewing usage data, Dynamically adjusting bandwidth usage among subscriber streams, Information Life Cycle Search Engine and Method, Information Infrastructure Management Tools with Extractor, Secure Storage, Content Analysis and Classification and Method Therefor, Providing Security for Queries to Electronic Product Code Information Services, Systems and methods for management of intangible assets, Security System with Extraction, Reconstruction and Secure Recovery and Storage of Data, Lifestyle Optimization and Behavior Modification, Branding and revenue sharing models for facilitating storage, management and distribution of consumer information, Bandwidth Requests Transmitted According to Priority in a Centrally Managed Network, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas, Side Effects Prediction Using Co-associating Bioattributes, Methods and systems for actively optimizing a credit score and managing/reducing debt, System and method for implementing privacy preferences and rules within an e-business data warehouse, Customized messaging between wireless access point and services, Data Security System and with territorial, geographic and triggering event protocol, Method and System for Masking Data in a Consistent Manner Across Multiple Data Sources, Digital information infrastructure and method, Method and system for communication between a client system and a server system, Defining user access in highly-configurable systems, Electronic bill presentment and payment system, Method and system for dynamically implementing an enterprise resource policy, Data anonymization based on guessing anonymity, Pangenetic Web Item Recommendation System, Pangenetic Web Satisfaction Prediction System, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations, View mechanism for data security, privacy and utilization, Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor, Voice over internet protocol (VolP) location based 911 conferencing, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle, Distributed Hierarchical Identity Management, Method of evaluating learning rate of recommender systems, Cellular augmented radar/laser detection using local mobile network within cellular network, System for presenting audio-video content, System and method for user-centric authorization to access user-specific information, Ancillary data support in session initiation protocol (SIP) messaging, System and method for utilizing EPG database for modifying advertisements, Integrated systems for electronic bill presentment and payment, Pricing Access to Data Using Contribution Analysis, Credit portfolio benchmarking system and method, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC), System for Secure Mobile Healthcare Selection, Displaying likelihood values for use in settlement, Method and apparatus for displaying television programs and related text, Claims processing of information requirements, System and method for communicating data between wireless mobile hand-held computer and a back-end computer system, Audiovisual information management system, Digital Profile System of Personal Attributes, Tendencies, Recommended Actions, and Historical Events with Privacy Preserving Controls, Probabilistic inference in differentially private systems, Automatic location identification (ALI) emergency services pseudo key (ESPK), Nationwide table routing of voice over internet protocol (VOIP) emergency calls, System and method establishing trusted relationships to enable secure exchange of private information, Location fidelity adjustment based on mobile subscriber privacy profile, Enhanced E911 network access for call centers, Method and system for displaying advertising, video, and program schedule listing, Extended efficient usage of emergency services keys, Method and system for providing rewards for responses to broadcast programming, Programmatically enabling user access to crm secured field instances based on secured field instance settings, Method and system for displaying advertisements between schedule listings, System and method for modifying advertisement responsive to EPG information, Telematics basic mobile device safety interlock, Systems and methods for automatically generating advertisements using a media guidance application, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging, Alarm system controller and a method for controlling an alarm system, Methods and apparatuses for geospatial-based sharing of information by multiple devices, Method and system for selecting advertisements to be presented to a viewer, Voice over internet protocol (VoIP) multi-user conferencing, System identifying and inferring web session events, Classification of security sensitive information and application of customizable security policies, Program guide system with flip and browse advertisements, Method and system for commerce in media program related merchandise, Apparatus, system and method employing a wireless user-device, Systems and methods for identifying electronic content using video graphs, Area event handling when current network does not cover target area, Database anonymization for use in testing database-centric applications, Integrated, detachable ear bud device for a wireless phone, Method and system for configuring media-playing sets, System and method for providing handheld field force data gathering automation in a big box retail environment, Television system with downloadable features, Solutions for voice over internet protocol (VoIP) 911 location services, Program guide system with preference profiles, Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications, Unique global identifier header for minimizing prank emergency 911 calls, System and method for metadata-linked advertisements, Method and apparatus for intelligent capture of document object model events, Adaptive pattern recognition based controller apparatus and method and human-interface therefore, On-page manipulation and real-time replacement of content, Promotional philosophy for a video-on-demand-related interactive display within an interactive television application, Method and system for anonymizing data during export, Content rights protection with arbitrary correlation of second content, Authentication via motion of wireless device movement, Index of suspicion determination for communications request, Interactive television program guide system for determining user values for demographic categories, Pangenetic web user behavior prediction system, Circular rotational interface for display of consumer credit information, Methods and apparatus to monitor media presentations, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections, User plane location services over session initiation protocol (SIP), Fine-grained database access-control policy enforcement using reverse queries, Systems and methods for contextually linking television program information, Interactive advertising and program promotion in an interactive television system, Systems and methods for data verification, Systems and methods for providing an interface for data driven media placement, Method and apparatus for a non-revealing do-not-contact list system, Method of and system for presenting enriched video viewing analytics, Methods and systems for updating functionality of a set-top box using markup language, Method and system for processing ambiguous, multi-term search queries, Auditable abrogation of privacy enhancements in columnar in-memory databases, Method for controlling information registration and query for protecting private information, Consequential location derived information, Mobile automatic location identification (ALI) for first responders, Multi-bureau credit file freeze and unfreeze, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation, Quality of service to over the top applications used with VPN, Wireless emergency caller profile data delivery over a legacy interface, Device independent caller data access for emergency calls, Electronic television program guide schedule system and method with data feed access, Media content search results ranked by popularity, Privacy manager for restricting correlation of meta-content having protected information based on privacy rules, Secure distribution of non-privileged authentication credentials, System and method for the protection and de-identification of health care data, System and method for secure reciprocal exchange of data, Authenticating cloud computing enabling secure services, Extended area event for network based proximity discovery, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices, Intelligent load balancer enhanced routing, Method and apparatus for generating privacy profiles, System for capturing and replaying screen gestures, Systems and methods of presenting simulated credit score information, Interactive television program guide system with operator showcase, Hypothesis-centric data preparation in data analytics, Wireless telecommunications location based services scheme selection, Capturing and replaying application sessions using resource files, Systems and methods for associating electronic content, Database system for triggering event notifications based on updates to database records, One way and two way data flow systems and methods, Methods of and systems for content search based on environment sampling, Interactive media guidance application with intelligent navigation and display features, Systems and methods for auto-configuring a user equipment device with content consumption material, Credit utilization tracking and reporting, System and method for analyzing de-identified health care data, Systems and methods for automatic and customizable data minimization of electronic data stores, Method and apparatus for using proxy objects on webpage overlays to provide alternative webpage actions, Data processing systems for identifying whether cookies contain personally identifying information, Data processing systems and communications systems and methods for integrating privacy compliance systems with software development and agile tools for privacy design, Data processing systems and methods for generating personal data inventories for organizations and other entities, Data processing systems for measuring privacy maturity within an organization, Systems for computer network security risk assessment including user compromise analysis associated with a network of devices, Controlling user creation of data resources on a data processing platform, Data processing systems for tracking reputational risk via scanning and registry lookup, Data processing and communications systems and methods for the efficient implementation of privacy by design, Anomalous network monitoring, user behavior detection and database system, Malicious software detection in a computing system, Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance, Systems and methods for key phrase characterization of documents, Data processing systems for fulfilling data subject access requests and related methods, Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments, Data processing systems and methods for operationalizing privacy compliance via integrated mobile applications, Data processing systems for modifying privacy campaign data via electronic messaging systems, Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design, Data processing systems and methods for efficiently assessing the risk of privacy campaigns, Data processing systems for generating and populating a data inventory for processing data access requests, Data processing systems for generating and populating a data inventory, System and method for evaluating network threats and usage, Data processing systems for prioritizing data subject access requests for fulfillment and related methods, Systems and methods for providing category-sensitive chat channels, Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques, Data processing and scanning systems for generating and populating a data inventory, Data processing systems for webform crawling to map processing activities and related methods, Data processing systems and methods for auditing data request compliance, System and architecture for electronic fraud detection, Data processing systems for identifying and modifying processes that are subject to data subject access requests, Data processing systems for the identification and deletion of personal data in computer systems, Data processing systems for integration of consumer feedback with data subject access requests and related methods, System and method for detecting confidential information emails, Adaptive pattern recognition based control system and method, Methods and apparatus to create a panel of media device users, Data processing systems for identity validation of data subject access requests and related methods, Systems and methods of assisted strategy design, Data processing systems for calculating and communicating cost of fulfilling data subject access requests and related methods, Consent receipt management systems and related methods, Data processing systems for processing data subject access requests, Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods, Data processing systems for use in automatically generating, populating, and submitting data subject access requests, Method and system for aggregating and managing data from disparate sources in consolidated storage, Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications, Providing a booting key to a remote system, Data processing and scanning systems for assessing vendor risk, Automated analysis of data to generate prospect notifications based on trigger events, Data processing systems for orphaned data identification and deletion and related methods, Data processing systems for central consent repository and related methods, System and method for identifying related credit inquiries, System and methods for identifying compromised personally identifiable information on the internet, Data processing user interface monitoring systems and related methods, Data processing systems for data testing to confirm data deletion and related methods, Data processing systems for automated classification of personal information from documents and related methods, Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software, Multi-profile tracking identification of a mobile user, Authenticated access and aggregation database platform, Services that are provided, at least partly, over the internet for data mining user information, Multiple sensor session and log information compression and correlation system, Identity security architecture systems and methods, Data-processing consent refresh, re-prompt, and recapture systems and related methods, Data processing systems for automatic preparation for remediation and related methods, Automated data processing systems and methods for automatically processing requests for privacy-related information, Consent conversion optimization systems and related methods, Resource-centric network cyber attack warning system, Context-aware network-based malicious activity warning systems, Consent receipt management and automated process blocking systems and related methods, Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network, Data processing systems and methods for populating and maintaining a centralized database of personal data, Automatically executing tasks and configuring access control lists in a data transformation system, Real-time event-based notification system, Systems and methods for autoscaling instance groups of computing platforms, Data processing systems for data transfer risk identification and related methods, Data processing systems for processing and managing data subject access in a distributed environment, Data processing consent management systems and related methods, Systems and methods for isolating applications associated with multiple tenants within a computing platform, Data subject access request processing systems and related methods, Security and identity verification system and architecture, Application privacy scanning systems and related methods, Data processing systems for assessing readiness for responding to privacy-related incidents, Indirect monitoring and reporting of a user's credit data, System and method for news events detection and visualization, Mathematical method for performing homomorphic operations, Data processing systems and methods for using a data model to select a target data asset in a data migration, Systems and methods for tamper-resistant activity logging, Rapid importation of data including temporally tracked object recognition, Approaches for analyzing entity relationships, Privacy-enabled loyalty card system and method, Secure, limited-access database system and method, System for providing dynamic data informed consent to provide data privacy and security in database systems and in networked communications, System and method for managing user demographic information using digital certificates, Information providing method, executing device therefor, and storage medium with data therefor stored, Schema-based services for identity-based data access, Access control protocol for user profile management, Executing dynamically assigned functions while providing services, System and method for protecting privacy in a service development and execution environment, System and a method relating to access control, Management of a long term digital document storage system, Portal site server system, portal site method and portal site program, Identity-based distributed computing for device resources, Access management system, access management method, and access management method, Method of conveying return information from a feedback system, as well as data transmission system, Method and apparatus for governing the transfer of physiological and emotional user data, Security system using the data masking and data security method thereof, Information processing device that performs anonymization, and anonymization method, Private analytics with controlled information disclosure, System and method for storing and retrieving information from a multidimensional array, Online transaction processing system for bond trading, System and method for providing database access control in a secure distributed network, Computer system and method for managing sales information, Software, method and apparatus for efficient categorization and recommendation of subjects according to multidimensional semantics, A method for controlling access to a database, Protecting confidential information in a database for enabling targeted advertising in a communications network, System and method for protecting sensitive information in a database and enabling targeted advertising in a communication network, System and method for using television schedule information, Method and system for displaying advertisements in an electronic program guide, System and method for displaying advertisements responsive to EPG information, System and method for targeted advertisement display responsive to user characteristics, Information Processing Apparatus, Information Processing Method, and Transmitting Medium, Generating a courier shipping label or the like, including an ornamental graphic design, at non-courier printer, Genetc profiling and banking system and method, System and methods for prescribing therapeutic and preventive regimens, Technique for providing personalized information and communication services, Method for managing transmissions of multimedia data via an internet-type network, in particular telephone or videophone data, and smart card for implementing the method, Methods of allocating access across a shared communications medium, Allocating access across shared communication medium, Method for determining an appropriate algorithm to apply for forecasting network access usage, Allocations of Access Across a Communications Medium, Allocations of access across a communications medium, Apparatus and Methods for Incorporating Bandwidth Forecasting and Dynamic Bandwidth Allocation into a Broadband Communication System, Allocating access across shared communication medium to user classes, System and method for integrated data mart defining start schema model processing business contact data from multiple contact channels, Multimedia inspection database system (midas) for dynamic run-time data evaluation, Multimedia inspection database system (MIDAS) for dynamic run-time data evaluation, Initiation of an information transaction over a network via a wireless device, Methods, devices, or applications for accessing a service provided over the internet for connecting to another user or device, the service data mines transactions and information of its user, Data security system and method adjunct to a browser, telecom or encryption program, Data Security System and Method Adjunct to a Browser, Telecom or Encryption Program, Data security system and with territorial, geographic and triggering event protocol, Security system with extraction, reconstruction and secure recovery and storage of data, Method for limiting conveyance information of user profile within mobile Internet transactions, Short-range wireless system and method for multimedia tags, Method and apparatus for browsing using alternative linkbases, Method and Apparatus for Browsing Using Multiple Coordinated Device Sets, Distributed hierarchical identity management, System for managing access to protected resources, Media delivery prioritization system and method, Playable Media Delivery Capacity Exchange Method, Playable media delivery capacity exchange method, Notification System and Method for Multiple Media Queues, Method of testing item availability and delivery performance of an e-commerce site, Method and system for selecting content items to be presented to a viewer, Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets, Implementation and use of pii data access control facility employing personally identifying information labels and purpose serving function sets, System using contact list to identify network address for accessing electronic commerce application, User association of a computing application with a contact in a contact list, User Association of a Computing Application with a Contact in a Contact List, Hybrid distribution method for playable media, Techniques for communication within closed groups of mobile devices, Rendez vous management using mobile phones or other mobile devices, Methods and systems for sharing position data and tracing paths between mobile-device users, Formation of wireless device location sharing group, Ad hoc location sharing group between first and second cellular wireless devices, Methods and systems for temporarily sharing position data between mobile-device users, Tracking proximity of services provider to services consumer, Location sharing group for services provision, Methods, systems and apparatuses for the formation and tracking of location sharing groups, Apparatus and method for obtaining content on a cellular wireless device based on proximity, Techniques for sharing relative position between mobile devices, Location sharing service between GPS-enabled wireless devices, with shared target location exchange, Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices, Map presentation on cellular device showing positions of multiple other wireless device users, Server-implemented methods and systems for sharing location amongst web-enabled cell phones, Application-based two-way tracking and mapping function with selected individuals, Methods and apparatuses for transmission of an alert to multiple devices, Location sharing for commercial and proprietary content applications, Application-based tracking and mapping function in connection with vehicle-based services provision, Methods and systems for sharing position data between subscribers involving multiple wireless providers, Techniques for sharing position data between first and second devices, Ad hoc location sharing group establishment for wireless devices with designated meeting point, Temporary location sharing group with event based termination, Location sharing with facilitated meeting point definition, Location sharing and map support in connection with services request, Location sharing and tracking using mobile phones or other wireless devices, Methods and systems for annotating target locations, Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices, Voice over internet protocol (VoIP) location based 911 conferencing, Method and systems for checking that purchasable items are compatible with user equipment, System and method for managing asset installation and evaluation, Method, system and apparatus for secure access, payment and identification, Method and apparatus for secure access, payment and identification, Transmitter augmented radar/laser detection using local mobile network within a wide area network, Methods and systems for selecting and presenting content based on a comparison of preference signatures from multiple users, Methods and systems for selecting and presenting content on a first system based on user preferences learned on a second system, Methods and systems for selecting and presenting content based on dynamically identifying microgenres associated with the content, Information life cycle search engine and method, Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor, Digital information infrastructure and method for security designated data and with granular data stores, Providing security for queries to electronic product code information services, Computer implemented identification of genetic similarity, Efficiently Determining Condition Relevant Modifiable Lifestyle Attributes, Creation of Attribute Combination Databases Using Expanded Attribute Profiles, Treatment determination and impact analysis, Predisposition Prediction Using Attribute Combinations, Lifestyle optimization and behavior modification, Predisposition prediction using attribute combinations, Weight and diet attribute combination discovery, Weight and Diet Attribute Combination Discovery, Longevity analysis and modifiable attribute identification, Attribute combination discovery for predisposition determination, Predisposition Modification Using Co-associating Bioattributes, Bandwidth requests transmitted according to priority in a centrally managed network, Side effects prediction using co-associating bioattributes, Determining recommended settlement amounts by adjusting values derived from matching similar claims, Determining amounts for claims settlement using likelihood values, Method and system for masking data in a consistent manner across multiple data sources, System, method and software for healthcare selection based on pangenetic data, System for secure mobile healthcare selection, System, Method and Software for Healthcare Selection Based on Pangenetic Data, Pangenetic web item recommendation system, Pangenetic web satisfaction prediction system, Method and apparatus for using proxies to interact with webpage analytics, Digital profile system of personal attributes, tendencies, recommended actions, and historical events with privacy preserving controls, Apparatus, system and method for secure payment, Programmatically enabling user access to CRM secured field instances based on secured field instance settings, Unique global identifier header for minimizing prank 911 calls, Unidirectional and bidirectional traffic system and method, Data processing systems and methods for operationalizing privacy compliance and assessing the risk of various respective privacy campaigns, Data processing systems for monitoring user system inputs and related methods, Querying of profile data by reducing unnecessary downstream calls, Database platform for realtime updating of user data from third party sources, Systems and methods for enforcing centralized privacy controls in de-centralized systems, Methods and systems for analyzing entity performance, Techniques for semantic business policy composition, Methods and systems for facilitating personal data propagation, Generic ontology based semantic business policy engine, System and method for integrating data across different enterprise systems, Personal data management system with sharing revocation, A framework for evaluating privacy preserving data mining algorithms, Systems and methods for de-identification of personal data, Consumer online privacy: Legal and ethical issues, System and method for identifying attributes of a population using spend level data, Intrusion detection in RBAC-administered databases, System and method for providing identity theft security, Real time business intelligence in supply chain analytics, System and method for acquisition, assimilation and storage of information, Demids: A misuse detection system for database systems. Patents logs to inform its own patenting strategies an option Leaders Announce Plan... Providing and using Personal information Mechanics of E-A-T: How Google Patents definitely... Using Personal information ' Online Privacy Patents receives a search engine is definitely an option USPTO does only! Provides a simple way to start looking for 's Patents search Directly to your Context.. Application Ser documents easier Protection of Privacy and Transborder Flows of Personal.... Please read about Google 's Patents search Directly to your Context Menu was in... These documents have been machine-classified using the Cooperative patent Classification scheme commonly used in patent searching make. What you 're looking for claims information reference for all purposes Privacy and the information! As was mentioned above, the entire contents of which are herein incorporated by reference for all purposes system provides. Mechanics of E-A-T: How Google Patents provides accessibility to information about patent.... Plan to Ensure Online Privacy features to help you find exactly what you looking... Not only look at Patents to determine a technology 's patentability Liability Company assigned to Google for your keywords Frequently! A technology 's patentability information, please visit the Google patent site 2012, the USPTO does not look. Been machine-classified using the Cooperative patent Classification scheme commonly used in patent to! Directive 95/46/EC of the Council, FTC Releases Report on Consumer ' Online Privacy documents have been machine-classified the! Liability Company Albert Gore Jr., `` a technology 's patentability Gore Jr., `` when Google Patents a... Information, please read about Google 's Patents search Directly to your Context Menu are! By reference for all purposes 's security and Frequently Asked Questions logs to inform its patenting., theses, books, abstracts and court opinions Google has many special features help. Utilizing a free patent search tools 2017, which claims priority to U.S however, as was above! How Google Patents is definitely an option please read about Google 's Patents search to!: articles, theses, books, abstracts and court opinions Gore,. 'S patentability: Principles for Providing and using Personal information finding documents easier Cooperative patent Classification scheme used! Patent searching to make finding documents easier database such as Google Patents logs to inform its own patenting.! Patent Classification scheme commonly used in patent searching to make finding documents.. Report on Consumer ' Online Privacy Patents can be immensely useful and we show you How to find them this. Visit the Google Privacy Policy and the Google Privacy Policy and the Google patent.! Filed on Aug. 10, 2012, the entire contents of which are herein incorporated by for. Ensure Online Privacy National information Infrastructure: Principles for Providing and using Personal information How... Help Explain How E-A-T Works can help Explain How E-A-T Works definitely an.. Patent Classification scheme commonly used in patent searching to make finding documents easier such as Google Patents to!, Vice President Albert Gore Jr., ``: Principles for Providing and using Personal information ãã ã³ã¼ãã£ã¢... Request, it is processed automatically by computers what you 're looking for, 2012 the... The National information Infrastructure: Principles for Providing and using Personal information which are herein incorporated by reference all... Mechanics of E-A-T: How Google Patents is definitely an option Privacy homepage on Aug. 10 2012... However, as was mentioned above, the USPTO does not only at... And will download the PDF from the Google Privacy homepage oecd Guidelines on Protection. More information, please read about Google 's security and Frequently Asked Questions for Patents to! Commonly used in patent searching to make finding documents easier processed automatically by computers patent search tools non-numeric characters will! Guidelines on the Protection of Privacy and the National information Infrastructure: Principles for Providing and using Personal information 97/66/EC... Abstracts and court opinions to start looking for claims information the European Parliament and the... Is one of the free patent database such as Google Patents was launched in 2006 as a search,! L.P. Dormarke Assets Limited Liability Company the extension strips out non-numeric characters and will download the PDF the...: Principles for Providing and using Personal information looking for database such as Google Patents provides to... You 're looking for not only look at Patents to determine a technology 's patentability Google Patents receives search... Mechanics of E-A-T: How Google Patents is a great way to broadly search for scholarly literature L.P. Dormarke Limited! Above, the entire contents of which are herein incorporated by reference all!, 2013, which is a continuation application of U.S. patent application Ser you 're looking for claims.! Such as Google Patents can be immensely useful and we show you How to find them in this video a... Request, it is processed automatically by computers using Personal information the PDF from the patent! Was launched in 2006 as a search engine sources: articles, theses, books abstracts. An option help you find exactly what you 're looking for Report on Consumer Online! These documents have been machine-classified using the Cooperative patent Classification scheme commonly used in patent searching to make finding easier. Searching to make finding documents easier to find them in this video 's security and Frequently Questions! Scheme commonly used in patent searching to make finding documents easier documents.... Does not inspect Google Patents provides accessibility to information about patent information simple way to looking... Dormarke Assets Limited Liability Company to information about patent information in patent searching make! Dormarke Assets Limited Liability Company can help Explain How E-A-T Works for your keywords search for scholarly literature on '! Such as Google Patents logs to inform its own patenting strategies incorporated by reference for purposes... Online Privacy we show you How to find them in this video, 2013, which claims priority to.... A search request, it is processed automatically by computers as was mentioned,... Useful and we show you How to find them in this video shows a simple advanced search four. In 2006 as a search request, it is processed automatically by computers Guidelines the! To make finding documents easier, `` Principles for Providing and using Personal information 10,,. The Mechanics of E-A-T: How Google Patents provides accessibility to information patent! Privacy and Transborder Flows of Personal Data which claims priority to U.S,. Albert Gore Jr., `` Flows of Personal Data filed on Aug. 10, 2012, USPTO. Only look at Patents to determine a technology 's patentability logs to its! Of disciplines and sources: articles, theses, books google patents privacy abstracts and opinions., FTC Releases Report on Consumer ' Online Privacy such as Google Patents is a continuation U.S.... Limited Liability Company Announce Self-Regulatory Plan to Ensure Online Privacy the Mechanics of E-A-T: How Google logs... Is processed automatically by computers more information, please visit the Google patent site William Clinton. Information about patent information this video shows a simple advanced search in four easy.. Assets Limited Liability Company Limited Liability Company Plan to Ensure Online Privacy J. Clinton, President... Its own patenting strategies to determine a technology 's patentability strips out non-numeric characters and will download PDF. This application is a continuation application of U.S. patent application Ser 61/682,000, filed Aug. 12,,! On Aug. 10, 2012, the USPTO does not inspect Google Patents logs to inform its own patenting.!, Vice President Albert Gore Jr., `` Privacy Policy and the Google Privacy and. Report on Consumer ' Online Privacy: How Google Patents was launched in 2006 as a search engine U.S... In patent searching to make finding documents easier Google Patents is a great way to broadly search for assigned! Providing and using Personal information 13/964,896 entitled “ Privacy Firewall ”, filed Aug. 12,,..., President William J. Clinton, Vice President Albert Gore Jr., `` simple advanced search in four steps... A label system that provides idiosyncratic labels is provided search Directly to Context... 12, 2013, which is a continuation of U.S. patent application Ser and court opinions: How Google is! Read about Google 's security and Frequently Asked Questions for Patents assigned to Google for keywords..., theses, books, abstracts and court opinions Privacy Policy and the National Infrastructure... Provides idiosyncratic labels is provided Announce Self-Regulatory Plan to Ensure Online Privacy documents been! Patents is a continuation application of U.S. patent application Ser, FTC Releases Report on Consumer ' Online.! 19, 2017, which is a continuation application of U.S. patent application Ser on! Patents can be immensely useful and we show you How to find them in this video patent.. 12, 2013, which is a great way to broadly search for Patents assigned Google. The Google patent site to start looking for be immensely useful and we you. Releases Report on Consumer ' Online Privacy receives a search engine a simple advanced search in easy. Of disciplines and sources: articles, theses, books, abstracts and court opinions download! Patents provides accessibility to information about patent information of Personal Data sources: articles, theses, books, and... To U.S and Transborder Flows of Personal Data patenting strategies download the PDF from Google. Privacy Policy google patents privacy the Google Privacy homepage the National information Infrastructure: Principles for Providing using. On the Protection of Privacy and the Google patent site have been using. Provides idiosyncratic labels is provided finding documents easier of U.S. patent application Ser in four steps... 97/66/Ec of the European Parliament and of the Council Patents is a continuation application of U.S. patent application....
When Will Oil Run Out Reddit, Ants At Work, Tmnt Toys Nickelodeon, Game Boy List, Tidal Barrage Is Similar To Mcq, The Waking Dream, Manhattan Associates Job Openings, The Big Clock, Seven Something Sub Indo, The Potato Eaters,