Patents by Inventor Ron Karidi
Ron Karidi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100257058Abstract: Methods, systems, and computer-readable media are disclosed for processing advertising bids based on user interactions. A particular method represents available user interactions in a probabilistic interaction graph that contains user interaction probabilities. Bids for advertising opportunities are received, and an expected overall bid value for each of the received bids is calculated using the probabilistic interaction graph. The bids with the highest expected overall bid values are awarded the advertising opportunities. The bidders awarded advertising opportunities are charged a fee that may be based on actual user interactions, the expected overall bid value of their bid, and the next-highest expected overall bid value of the received bids.Type: ApplicationFiled: April 6, 2009Publication date: October 7, 2010Applicant: Microsoft CorporationInventors: Ron Karidi, Moshe Tennenholtz
-
Publication number: 20100257035Abstract: A digital document request can be received at a publisher computing environment from a client computing environment. A document requested by the digital document request can include an embedded content placeholder. A third-party embedded content request can be sent from a content broker computing environment (which may be the same as or different from the publisher computing environment) to an embedded content provider computing environment to request content for the embedded content placeholder. Content corresponding to the third-party embedded content request can be received at the content broker computing environment. In addition, the digital document can be sent from the publisher computing environment to the client computing environment, and the content can be sent from the content broker computing environment to the client computing environment. Advertisement selection can also be delegated to an advertisement selection delegate computing environment.Type: ApplicationFiled: April 7, 2009Publication date: October 7, 2010Applicant: Microsoft CorporationInventors: Kfir Karmon, Roy Varshavsky, Ron Karidi, Hen Fitoussi, Liza Fireman
-
Publication number: 20100175019Abstract: An ad hoc business data exploration tool is disclosed, which provides guided access to the vast amount of data within a multidimensional database. The tool provides guided access by suggesting insights which may be of particular interest to the user based on a scoring of the insights and user feedback on desirable/undesirable insights. The present system works in conjunction with custom algorithms, as well as a conventional multidimensional database.Type: ApplicationFiled: January 5, 2009Publication date: July 8, 2010Applicant: MICROSOFT CORPORATIONInventors: Daniel Sitton, Roy Varshavsky, Kfir Kamon, Ron Karidi
-
Publication number: 20100169331Abstract: Information is automatically located which is relevant to source content that a user is viewing on a user interface without requiring the user to perform an additional search or navigate links of the source content. The source content can be, e.g., a web page or a document from a word processing or email application. The relevant information can include images, videos, web pages, maps or other location-based information, people-based information and special services which aggregate different types of information. Related content is located by analyzing textual content, user behavior and connectivity relative to the source. The related content is scored for similarity to the source. Content which is sufficiently similar but not too similar is selected. Similar related content is grouped to select representative results. The selected content is filtering in multiple stages based on attribute priorities to avoid unnecessary processing of content which is filtered out an early stage.Type: ApplicationFiled: December 29, 2008Publication date: July 1, 2010Inventors: Ron Karidi, Roy Varshavsky, Noga Amit, Oded Elyada, Daniel Sitton, Limor Lahiani, Hen Fitoussi, Eran Yariv, Benny Schlesinger
-
Publication number: 20100162174Abstract: A method of presenting information on a display monitor within a computing environment includes accessing a website containing a related collection of electronic pages, crawling the website to obtain raw image data for at least some of each of the pages, porting the raw image data into a template so that each of the crawled pages is converted into a corresponding information panel containing a mapping of the content of its respective corresponding page, and displaying each of the information panels on a respective display monitor so all of the panels are viewable to a user in a single screen shot. Related methods, apparatus, and systems are further provided.Type: ApplicationFiled: December 24, 2008Publication date: June 24, 2010Inventors: RON KARIDI, Oded Elyada, Liza Fireman, Hen Fitoussi, Roy Varshavsky, Eran Yariv
-
Publication number: 20100125912Abstract: Security risk for a single IT asset and/or a set of IT assets in a network such as an enterprise or corporate network may be estimated and represented in a visual form by categorizing risk into different discrete levels. The IT assets may include both computing devices and users. The risk categorization uses a security assessment of an IT asset that is generated to indicate the type of security problem encountered, the severity of the problem, and the fidelity of the assessment. The asset value of an IT asset to the enterprise is also assigned. Security risk is then categorized (and a numeric risk value provided) for each IT asset for different problem types by considering the IT asset value along with the severity and fidelity of the security assessment. The security risk for the enterprise is estimated using the numeric risk value and then displayed in visual form.Type: ApplicationFiled: November 19, 2008Publication date: May 20, 2010Applicant: MICROSOFT CORPORATIONInventors: Adar Greenshpon, Ron Karidi, Yair Helman, Shai Aharon Rubin
-
Publication number: 20090328216Abstract: A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may include desktop and network resources such as address book contacts, instant messaging contacts, active directory user accounts, IP addresses, and files that contain particular content or that are stored in particular locations. The resources may be real for which protection against leakage is desired, or fake to operate as bait to lure and detect malicious attacks. The honeypot is implemented in an extensible manner so that virtually any resource may be honeypotted to apply honeypot benefits to resources beyond static IP addresses in order to improve both the breadth of information leakage prevention and the detection of malicious attacks.Type: ApplicationFiled: June 30, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Ziv Rafalovich, Lior Arzi, Ron Karidi, Efim Hudis
-
Publication number: 20090328215Abstract: Semantic networks are generated to model the operational behavior of an enterprise network to provide contextual interpretation of an event or a sequence of events that are observed in that specific enterprise network. In various illustrative examples, different semantic networks may be generated to model different behavior scenarios in the enterprise network. Without the context provided by these semantic networks malicious events may inherently be interpreted as benign events as there is typically always a scenario where such events could be part of normal operations of an enterprise network. Instead, the present semantic networks enable interpretation of events for a specific enterprise network. Such interpretation enables the conclusion that a sequence of events that could possibly be part of normal operations in a theoretical enterprise network is, in fact, abnormal for this specific enterprise network.Type: ApplicationFiled: June 30, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Lior Arzi, Ron Karidi, Shai Aharon Rubin, Efim Hudis
-
Publication number: 20090313536Abstract: A requested content page is provided with additional relevant content that is dynamically generated. A page originally requested by a browser application is generated and examined to determine key words, address information, and other information for which relevant content may be retrieved. The other information may not be part of the original page content, but it can be the relation between the content page and other pages. The relevant content is determined based on the results of the content page examination. After retrieving the relevant content, the retrieved content is embedded into the requested content page and provided to the requesting user. The retrieved relevant content may be provided with the requested content page in a designated portion within the requested content page, near related content in the page, and/or displayed in response to user input as a pop-up window or in a preview pane.Type: ApplicationFiled: June 11, 2008Publication date: December 17, 2009Applicant: Microsoft CorporationInventors: Ron Karidi, Eran Yariv, Roy Varshavsky, Daniel Sitton, Oded Elyada, Noga Amit, Omer Ramote
-
Publication number: 20090313558Abstract: A service provides an image collection as a visual preview of content pages having a link in or otherwise related to a current page. A first content page is provided to a user and may have one or more links to additional content pages. Each of the related content pages may have one or more images. Selected images of the one or more content pages are provided in an image collection. The images may be positioned in rows, columns, or some other manner within the collection. The image collection is prepared dynamically from related content pages when the current page is loaded and does not require any software in the currently content page to be changed as the linked content pages change.Type: ApplicationFiled: June 11, 2008Publication date: December 17, 2009Applicant: Microsoft CorporationInventors: Eran Yariv, Ron Karidi, Roy Varshavsky, Daniel Sitton, Oded Elyada
-
Publication number: 20090177538Abstract: Advertisements may be displayed on electronic devices within a variety of contexts, such as websites and applications, but the amount of information that may be conveyed by small advertisements in a portion of the screen may be limited. One technique for displaying information in a limited space involves a zoomable advertisement, wherein the advertisement displayed in a first zoom state is supplemented with additional information upon transitioning to a second zoom state (e.g., zooming in to visualize small content, and zooming out to visualize content that was out of bounds in the first zoom state.) Moreover, the content visible at the second zoom state may present advertising content targeted with respect to the user and based on one or more user criteria. The system may notify an advertisement tracking server of various events, e.g., upon rendering the targeted content on behalf of the user.Type: ApplicationFiled: January 8, 2008Publication date: July 9, 2009Applicant: MICROSOFT CORPORATIONInventors: Brett Brewer, Ron Karidi
-
Publication number: 20080301541Abstract: A method and a system for enabling website navigation, the method comprising: providing web-page tags with capabilities for rendering specific content for each visitor to a web page/site based on the past and current behavior of the visitor; providing configurable content templates and editable content embedded in the webpage/site; and providing a real-time delivery means and a configuration means for the real-time delivery of the specific content to a webpage/site and for configuring the specific content of the webpage/site, respectively. A marketer is enabled to configure the specific content via the system using the web-page tags and is also given the ability to embed automatically generated content which reflects the entire web-branch of pages that are accessible from the specific link. The system further enables zooming between one or more websites, or groups of web pages to access the embedded content.Type: ApplicationFiled: April 26, 2007Publication date: December 4, 2008Inventor: Ron KARIDI
-
Publication number: 20070133025Abstract: Methods and apparatus for reconstructing digitized images are provided that include an image reconstruction path that receives a digitized image and provides a processed RGB or CMYK image that may be printed or stored in memory. The image reconstruction path is configured to operate in either a multiple scan or single scan environment if the source of the digitized image is a scanner. A plurality of optional functional units in the reconstruction path can be controlled by user or internal controls. These functional units perform preliminary color adjustment, automatic deskew, background and dust removal, descreen, text detection and enhancement, color conversion, scaling, and color manipulation.Type: ApplicationFiled: February 13, 2007Publication date: June 14, 2007Inventor: Ron Karidi
-
Publication number: 20070127815Abstract: A text detection technique comprises local ramp detection, identification of intensity troughs (candidate text strokes), determination of stroke width, preliminary detection of text based on contrast and stroke width, and a consistency check.Type: ApplicationFiled: February 12, 2007Publication date: June 7, 2007Inventors: Ron Karidi, Lai Man
-
Publication number: 20070061412Abstract: A system and method for dynamically generating a web page is disclosed. The web page includes a frame having content cells. Content for the content cells is provided based in part on business rules. A business rules engine processes, in real-time, an online interaction and determines appropriate content for the content cells. The business rules engine outputs a pointer to the content which is used to populate the content cell.Type: ApplicationFiled: March 31, 2006Publication date: March 15, 2007Inventors: Ron Karidi, Dan Shalom, Amir Zucker, Tal Goldberg, Joseph Mermelstein
-
Publication number: 20070061421Abstract: A system and method for follow up management comprising determining if a user has an unexpired repository record, extracting information from the repository record associated with the user; and acting on instructions stored in the repository record. The method is practiced on a system for managing online interaction comprising a business rules engine a follow up repository, and a follow up engine.Type: ApplicationFiled: February 24, 2006Publication date: March 15, 2007Inventor: Ron Karidi
-
Publication number: 20050190410Abstract: Methods and apparatus are provided to smooth a jagged outline of a reconstructed text generated through any of a variety of systems, such as, for example, an image scanner. Given the reconstructed text with a jagged outline, the methods smooth the outline of the text first through location of horizontal and vertical edges, and subsequent gray scale reconstruction of the edge ink level from a one-bit or a low number of bits edge pattern. The methods then provide identification of the local text outline pattern and corresponding ink level adjustment of the center pixel. The methods produce text having very smooth horizontal and vertical edges. The methods then smooth slanted edges, mend holes in the text, and remove isolated pixels of ink.Type: ApplicationFiled: April 25, 2005Publication date: September 1, 2005Inventors: Ron Karidi, La Man