Melih
Melih Abdulhayoglu, Montclair, NJ US
Patent application number | Description | Published |
---|---|---|
20090235359 | METHOD AND SYSTEM FOR PERFORMING SECURITY AND VULNERABILITY SCANS ON DEVICES BEHIND A NETWORK SECURITY DEVICE - A method and system of performing vulnerability and security scans on an internet connected device where the device is behind a network security device such as a firewall. The method is performed by having an agent that is local to the device to be scanned create a VPN connection with a scanning server and then performing the scanning over the VPN. The connection is terminated at the end to free up system resources. | 09-17-2009 |
20100121681 | Method and System of Contextual Advertising - A method of advertising using a user profile based on a user's interaction with websites, including the time spent on the website and the user's rating of keywords associated with the contents of the website. | 05-13-2010 |
20100275024 | METHOD AND SYSTEM FOR DISPLAYING VERIFICATION INFORMATION INDICATORS ON A NON-SECURE WEBSITE - A method and system of displaying information indicators that help provide security assurances to consumers. The method works by having a plug-in or browser extension that determines the URL of a browsed to website. The browser then initiates a secure connection to the domain associated with the URL of a browsed-to website. The plug-in can then show an indicator based on whether or not a digital certificate exists. If desired, the plug-in can perform further checks to ensure the validity and authenticity of the certificate. The information indicators can be static, pre-selected by the program, or selected by the end user. | 10-28-2010 |
20100312621 | METHOD AND SYSTEM FOR MANAGING EMAIL - A system is provided for managing email and eliminating spam wherein an email client ( | 12-09-2010 |
20100313268 | METHOD FOR PROTECTING A COMPUTER AGAINST MALICIOUS SOFTWARE - A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful. | 12-09-2010 |
20110264585 | METHOD AND SYSTEM FOR MANAGING EMAIL - A system is provided for managing email and eliminating spam wherein an email client ( | 10-27-2011 |
20120296713 | System of Validating Online Advertising From Third Party Sources - A system is provided for security and validation for online advertising from third party sources. The system identifies outgoing calls to known advertising networks when a DNS user loads a webpage by identifying the outgoing call via a link and investigating the DNS query being called. Once the advertiser network which was called has been identified, the system intercepts the call placed by the advertisement code and redirects the call to a server which holds validated and certified third party ads from a certified network. The certified ad platform answers and responds to the call by feeding back a certified advertisement to be displayed on the page of the web visitor page. | 11-22-2012 |
20130144970 | SYSTEM FOR SERVING CONTENT BASED ON A USER PROFILE - There is provided a computer implemented system and method for building a profile of a user associated with a particular IP address. The system and method include establishing a proxy server for a plurality of discrete client IP addresses and providing a connection there from to a wide area network through the proxy server. A list of resources provided to each of the discrete client IP addresses is logged on the proxy server, and a profile is determined for each of the discrete client IP addresses based on a predetermined formula. Advertisements and content are served to each of the discrete client IP addresses corresponding to the user's profile. | 06-06-2013 |
20140044364 | Method of Image Identification Based on Artificial Intelligence - A method of image identification based on artificial intelligence is provided, the method includes initializing a second computer with a first computer supplying and accepting image data from the first computer to the second computer; comparing the delivered image data in the second computer to pre-existing stored images in the second computer; generating and displaying a first result if the delivered image data is the same as the stored image in the second computer and a second result if the delivered image data is not the same as the stored image data; and un initializing the second computer based on the first and second results. | 02-13-2014 |
20150112794 | System And Process For Cloud Based Conversion Tracking - A system and process are provided for a cloud based conversion tracking due to multimedia content files, including advertisements, where the multimedia content provider is not required to modify the provider's website to achieve the conversion tracking, which occurred by the user at client side clicking on a multimedia content file and causing an action considered as a conversion by the provider of the multimedia content. | 04-23-2015 |
Melih Abdulhayoglu, Jersey City, NJ US
Patent application number | Description | Published |
---|---|---|
20110252468 | METHOD AND SYSTEM FOR PROTECTING A COMPUTER AGAINTS MALICIOUS SOFTWARE - A method of protecting a computer by having security software be set to clean mode where the clean mode acts as if files installed or modified before the clean date are safe and installed or modified after the clean date as potentially harmful. | 10-13-2011 |
Melih Karaman, Istanbul TR
Patent application number | Description | Published |
---|---|---|
20140211661 | Automatic Discovery of Multiple Controllers in Software Defined Networks (SDNs) - Controllers in a Software Defined Network (SDN) automatically discover and authenticate each other as part of the control plane operations, without any need for manual configuration of other controllers. The new capability of such controllers is based on Controller-Advertisement messages transferred between controllers in the same or different SDNs. In doing so, multiple controllers can be used for load sharing, improved reliability under failure of a controller by enabling seamless take over and recovery. Moreover, controllers can cooperate to enable end-to-end services to work across multiple SDNs. Controller-Advertisement messages are also used to check the health statuses of discovered controllers in the same or different SDNs. | 07-31-2014 |
20150312132 | METHOD TO CHECK HEALTH OF AUTOMATICALLY DISCOVERED CONTROLLERS IN SOFTWARE DEFINED NETWORKS (SDNs) - A method to check health of automatically discovered controllers comprises the steps of: (a) a first controller generating a first Controller-Advertisement message carrying the information required to identify and access the first controller when a new switch port becomes active; (b) the first controller sending the generated first Controller-Advertisement to a first switch having the newly activated port; (c) the first controller receiving at least a second Controller-Advertisement message from at least a second controller; (d) the first controller generating a third unsolicited Controller-Advertisement message with its access information to check health of the second controller; (e) the first controller receiving at least a fourth Controller-Advertisement message from the second controller indicating health information of the second controller, wherein the health information is stored in first controller's Controller Information Base (CIB). | 10-29-2015 |
Melih Kucukerdonmez, Ankara TR
Patent application number | Description | Published |
---|---|---|
20140199971 | Docking Station and Method for Connecting a Mobile Communication Device to a Communication Infrastructure - A docking station and a method for connecting a mobile communication device to an at least partially wire-based communication infrastructure are disclosed. The docking station has a cradle for the storage of the communication device. A detection device detects the presence of the communication device within a selected distance from the docking station and receives authentication information from the communication device. There is also an authentication device for validating the credentials of the communication terminal and for enabling communication with the communications infrastructure on the basis of authentication information. A first interface provides a first wireless communication link with the communication device and a second interface establishes a second wired communication link to the communication infrastructure. A transfer device can switch from the first communication link to the second communication link. A communication system containing the docking station is also disclosed. | 07-17-2014 |
Melih Olcay, Istanbul TR
Patent application number | Description | Published |
---|---|---|
20090013954 | AIR FEED APPARATUS OPERATING WITH VACUUM IN INTERNAL COMBUSTION ENGINES - In the internal combustion engines the technique of air feed operating with vacuum is important in view of the meeting of increasing and decreasing air-oxygen demand varying according to the change of revolution. While causing engine failure and increase of heat at low revolution with excess air-oxygen, it causes high fuel consumption at high revolution with less air-oxygen. In order for the fuel to be fully combusted, it provides sufficient air-oxygen during all revolutions, from the lowest to the highest, in correct proportion with the suction of the vacuum by the engine. | 01-15-2009 |
Melih Ozgul, Hillsboro, OR US
Patent application number | Description | Published |
---|---|---|
20140223105 | METHOD AND APPARATUS FOR CUTTING SENIOR STORE LATENCY USING STORE PREFETCHING - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for cutting senior store latency using store prefetching. For example, in one embodiment, such means may include an integrated circuit or an out of order processor means that processes out of order instructions and enforces in-order requirements for a cache. Such an integrated circuit or out of order processor means further includes means for receiving a store instruction; means for performing address generation and translation for the store instruction to calculate a physical address of the memory to be accessed by the store instruction; and means for executing a pre-fetch for a cache line based on the store instruction and the calculated physical address before the store instruction retires. | 08-07-2014 |
Melih Ozmen, Reno, NV US
Patent application number | Description | Published |
---|---|---|
20100178977 | EGM AUTHENTICATION MECHANISM USING MULTIPLE KEY PAIRS AT THE BIOS WITH PKI - Executable applications on a gaming machine are verified before they can be executed, for security purposes and to comply with jurisdictional requirements. Unlike in prior systems for authenticating the executable applications, embodiments allow for new executable applications to be provided and verified over time with different private and public key pairs, even after the operating code of the gaming machine is certified by the jurisdiction and deployed in the field. | 07-15-2010 |
20140250299 | EGM AUTHENTICATION MECHANISM USING MULTIPLE KEY PAIRS AT THE BIOS WITH PKI - Executable applications on a gaming machine are verified before they can be executed, for security purposes and to comply with jurisdictional requirements. Unlike in prior systems for authenticating the executable applications, embodiments allow for new executable applications to be provided and verified over time with different private and public key pairs, even after the operating code of the gaming machine is certified by the jurisdiction and deployed in the field. | 09-04-2014 |
Melih Papila, Istanbul TR
Patent application number | Description | Published |
---|---|---|
20150360408 | SELF-HEALING SYSTEM COMPRISING LOGITUDINAL NANO/MICROSTRUCTURES AND METHOD OF PRODUCTION THEREOF - A self-healing system of nano/microstructures comprising a first type | 12-17-2015 |
Melih Sacli, Thousand Oaks, CA US
Patent application number | Description | Published |
---|---|---|
20090256326 | SUSPENSION SYSTEM PROVIDING TWO DEGREES OF FREEDOM - A combination of existing suspension designs is provided to suspend moving vehicles such as cars, trucks, planes, and snowmobiles and provide two degrees of freedom in the wheels or skis. The design combines a dive suspension with a roll suspension, including a locking linkage. The locking linkage locks out the roll suspension during dive, jounce, flight or two-wheel bump motion. Both the dive and roll suspensions are responsive during roll motion and one-wheel bump motion. | 10-15-2009 |