Patents by Inventor Joshua B. Hurwitz
Joshua B. Hurwitz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11553450Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: GrantFiled: December 28, 2020Date of Patent: January 10, 2023Assignee: The Nielsen Company (US), LLCInventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Publication number: 20210266863Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: ApplicationFiled: December 28, 2020Publication date: August 26, 2021Inventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Patent number: 10880861Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: GrantFiled: January 3, 2020Date of Patent: December 29, 2020Assignee: The Nielsen Company (US), LLCInventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Publication number: 20200221414Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: ApplicationFiled: January 3, 2020Publication date: July 9, 2020Inventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Patent number: 10531425Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: GrantFiled: September 29, 2017Date of Patent: January 7, 2020Assignee: The Nielsen Company (US), LLCInventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Publication number: 20190104497Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for locating mobile devices using wireless signals in mixed mode.Type: ApplicationFiled: September 29, 2017Publication date: April 4, 2019Inventors: Rafael E. Alonso, Joshua B. Hurwitz
-
Patent number: 10152611Abstract: Determining sensitive information and preventing the unauthorized or unintended dissemination of such information are disclosed. Terms are determined from documents associated with users in a network. Distributions among users and relative frequencies with which the terms are used are determined. Link strengths between users are calculated. Based on the distribution of the terms, the relative frequencies of use among the user profiles and link strengths between users conducting information transactions that include the terms, a sensitivity level for each term can be determined. To determine whether a particular information transaction with particular terms may be conducted between two users in the network, a combination of link strength between the users and sensitivity level of the terms with respect to the users or users' profiles are considered. If the information transaction includes terms that are unknown to one of the users, then a warning or alarm can be raised.Type: GrantFiled: February 8, 2013Date of Patent: December 11, 2018Assignee: ARRIS Enterprises LLCInventors: Joshua B. Hurwitz, Zhi Fu, Douglas A. Kuhlman
-
Patent number: 9595039Abstract: Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.Type: GrantFiled: December 30, 2009Date of Patent: March 14, 2017Assignee: MOTOROLA SOLUTIONS, INC.Inventors: Mark A. Gannon, Joshua B. Hurwitz, John Richard Kane, David W. Kravitz, Douglas A. Kuhlman
-
Patent number: 9330277Abstract: A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced.Type: GrantFiled: June 21, 2012Date of Patent: May 3, 2016Assignee: Google Technology Holdings LLCInventors: Joshua B. Hurwitz, Alfonso Martinez Smith, Paul C. Davis, Douglas A. Kuhlman, Hiren M. Mandalia, Loren J. Rittle, Krunal S. Shah
-
Patent number: 8972540Abstract: Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.Type: GrantFiled: December 30, 2009Date of Patent: March 3, 2015Assignee: Motorola Solutions, Inc.Inventors: Mark A. Gannon, Joshua B. Hurwitz, John Richard Kane, David W. Kravitz
-
Patent number: 8959574Abstract: A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity.Type: GrantFiled: June 21, 2012Date of Patent: February 17, 2015Assignee: Google Technology Holdings LLCInventors: Douglas A. Kuhlman, Paul C. Davis, Joshua B. Hurwitz, Alfonso Martinez Smith, Loren J. Rittle, Krunal S. Shah
-
Publication number: 20140245452Abstract: When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference.Type: ApplicationFiled: February 26, 2013Publication date: August 28, 2014Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Joshua B. Hurwitz, Douglas A. Kuhlman, Loren J. Rittle
-
Publication number: 20140230066Abstract: Determining sensitive information and preventing the unauthorized or unintended dissemination of such information are disclosed. Terms are determined from documents associated with users in a network. Distributions among users and relative frequencies with which the terms are used are determined. Link strengths between users are calculated. Based on the distribution of the terms, the relative frequencies of use among the user profiles and link strengths between users conducting information transactions that include the terms, a sensitivity level for each term can be determined. To determine whether a particular information transaction with particular terms may be conducted between two users in the network, a combination of link strength between the users and sensitivity level of the terms with respect to the users or users' profiles are considered. If the information transaction includes terms that are unknown to one of the users, then a warning or alarm can be raised.Type: ApplicationFiled: February 8, 2013Publication date: August 14, 2014Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Joshua B. Hurwitz, Zhi Fu, Douglas A. Kuhlman
-
Publication number: 20130347057Abstract: A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced.Type: ApplicationFiled: June 21, 2012Publication date: December 26, 2013Applicant: General Instrument CorporationInventors: Joshua B. Hurwitz, Alfanso Martinez Smith, Paul C. Davis, Douglas A. Kuhlman, Hiren M. Mandalia, Loren J. Rittle, Krunal S. Shah
-
Publication number: 20130346414Abstract: One disclosed method includes receiving correlation instructions related to a plurality of meta-content elements that are associated with a primary content. The primary content may be multimedia content such as, but not limited to, an audiovisual content. The method includes performing a correlation in response to receiving the instructions. The correlation is between the meta-content elements, where the meta-content elements each have an arbitrary granularity defining meta-content segments. The method returns a result based on the correlation. Another disclosed method include receiving a request having correlation instructions related to a plurality of meta-content elements, where the meta-content elements are associated with a primary content. Again, each meta-content element has an arbitrary granularity defining meta-content segments.Type: ApplicationFiled: June 21, 2012Publication date: December 26, 2013Applicant: General Instrument CorporationInventors: Alfonso Martinez Smith, Paul C. Davis, Joshua B. Hurwitz, Douglas A. Kuhlman, Hiren M. Mandalia, Loren J. Rittle, Krunal S. Shah
-
Publication number: 20130347056Abstract: A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity.Type: ApplicationFiled: June 21, 2012Publication date: December 26, 2013Applicant: General Instrument CorporationInventors: Douglas A. Kuhlman, Paul C. Davis, Joshua B. Hurwitz, Alfonso Martinez Smith, Loren J. Rittle, Krunal S. Shah
-
Publication number: 20130132330Abstract: A system and methods of managing privacy settings of a user are presented here. The system obtains context information that is indicative of a contextual scenario associated with operation of a user device and determines, with a first analytics system, a first set of privacy settings predictions that is influenced at least in part by the context information. A second analytics system is used to determine a second set of privacy settings predictions that is influenced at least in part by the context information. When the first set of privacy settings predictions differ from the second set of privacy settings predictions by at least a threshold amount, the system issues a query for user-specified privacy settings for the contextual scenario.Type: ApplicationFiled: November 22, 2011Publication date: May 23, 2013Applicant: MOTOROLA MOBILITY, INC.Inventors: Joshua B. Hurwitz, Guohua Hao, Douglas A. Kuhlman
-
Publication number: 20130036173Abstract: A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.Type: ApplicationFiled: August 2, 2011Publication date: February 7, 2013Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Douglas A. Kuhlman, Joshua B. Hurwitz, Craig A. Janssen, David W. Kravitz
-
Publication number: 20130035944Abstract: A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.Type: ApplicationFiled: August 2, 2011Publication date: February 7, 2013Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Joshua B. Hurwitz, Douglas A. Kuhlman, Craig A. Janssen, David W. Kravitz
-
Publication number: 20130036174Abstract: A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.Type: ApplicationFiled: August 2, 2011Publication date: February 7, 2013Applicant: GENERAL INSTRUMENT CORPORATIONInventors: Joshua B. Hurwitz, Douglas A. Kuhlman, Craig A. Janssen, David W. Kravitz