Patents by Inventor Jeffrey Zwelling
Jeffrey Zwelling has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11431825Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: GrantFiled: October 20, 2020Date of Patent: August 30, 2022Assignee: Yahoo Assets LLCInventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Publication number: 20210105341Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: ApplicationFiled: October 20, 2020Publication date: April 8, 2021Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Patent number: 10848598Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: GrantFiled: September 27, 2019Date of Patent: November 24, 2020Assignee: Verizon Media Inc.Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Publication number: 20200028941Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: ApplicationFiled: September 27, 2019Publication date: January 23, 2020Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Patent number: 10469625Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: GrantFiled: April 6, 2017Date of Patent: November 5, 2019Assignee: Oath (Americas) Inc.Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Publication number: 20170214771Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: ApplicationFiled: April 6, 2017Publication date: July 27, 2017Inventors: Gary GUREVICH, Jeffrey ZWELLING, Yaniv SHALEV
-
Patent number: 9648142Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: GrantFiled: September 11, 2015Date of Patent: May 9, 2017Assignee: AOL ADVERTISING INC.Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Publication number: 20160006841Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: ApplicationFiled: September 11, 2015Publication date: January 7, 2016Inventors: Gary GUREVICH, Jeffrey ZWELLING, Yaniv SHALEV
-
Patent number: 9165124Abstract: Methods and systems are provided for identifying unique devices and/or unique users of a web-based system within constraints of an external application. In some embodiments the process comprises receiving request information from a client device at an application server, using such information to form a device fingerprint, and attempting to match the newly-formed fingerprint with exactly one fingerprint stored in a database of previously-formed fingerprints. Some embodiments utilize a two-stage Locality-Sensitive Hash query technique. The client device fingerprint may be converted into a series of LSH values which may be used to find a matching fingerprint. A first stage may query input LSH values against LSH values in a data store, and a second stage may query LSH values temporarily held in volatile memory, thereby minimizing network traffic and reducing a total process time.Type: GrantFiled: June 22, 2012Date of Patent: October 20, 2015Assignee: Convertro, Inc.Inventors: Gary Gurevich, Jeffrey Zwelling, Yaniv Shalev
-
Publication number: 20070198533Abstract: The exchange of documents for execution can be performed efficiently using an automated system that routes and stores documents based on routing information. Routing may be accomplished with reminders for individuals of deadline for responding. After execution is confirmed, an executed copy may be forwarded to all parties and desired non-parties. If execution or approval is desired from a plurality of individuals, documents received from each of the plurality of individuals can be merged into a single, fully executed document if the approval/signatures are obtained simultaneously. Search capability for identifying data regarding the document, text within the document, or both may also be provided.Type: ApplicationFiled: January 17, 2007Publication date: August 23, 2007Inventors: Dan Foygel, Jason Lemkin, Jeffrey Zwelling
-
Publication number: 20070198560Abstract: The exchange of documents for signature can be performed efficiently using an automatic routing system that associates a document with appropriate identifying metadata. The routing can be facilitated through facsimile in which the metadata is encoded on a return facsimile cover sheet that is routed with the document. Appropriate central exchange servers have appropriate input and out subsystems to perform the document routing. The executed documents can be conveniently archived for efficient document storage and access, such as network access to one or more of the parties.Type: ApplicationFiled: January 11, 2007Publication date: August 23, 2007Inventors: Dan Foygel, Jason Lemkin, Jeffrey Zwelling
-
Publication number: 20070192275Abstract: The exchange of documents for execution can be performed efficiently using an automated system that routes and archives documents. The system may facilitate the exchange of drafts between parties by highlighting changes of the current draft with respect to the previous draft. Documents may be conveniently archived for efficient document storage and access by providing one or more central archive databases accessible through a shared network to a plurality of organizations. The operating system of the database may provide systematic access to individuals associated with an organization with the privilege to access documents according to a specific organizational hierarchy. Routing and archiving documents may be accomplished through a central exchange server.Type: ApplicationFiled: January 17, 2007Publication date: August 16, 2007Inventors: Dan Foygel, Jason Lemkin, Jeffrey Zwelling