Patent application number | Description | Published |
20080244089 | INTERFACE FOR A DELAY-TOLERANT NETWORK - The present disclosure provides a method for delay tolerant networking. According to one exemplary embodiment, the method may include transmitting a file from a first node associated with a first network to at least one intermediate node via a file-system interface. The method may also include receiving the file at the at least one intermediate node via the file system interface. The method may further include transmitting the file from the at least one intermediate node to at least one node of an additional network via the file-system interface and receiving the file at the at least one node of the additional network via the file-system interface. Of course, additional embodiments, variations and modifications are possible without departing from this embodiment. | 10-02-2008 |
20090070266 | SYSTEM AND METHOD FOR PHYSIOLOGICAL DATA AUTHENTICATION AND BUNDLING WITH DELAYED BINDING OF INDIVIDUAL IDENTIFICATION - A system and method for physiological data authentication and bundling with delayed binding of individual identification. In embodiments, the invention utilizes biometric data within a physiological data stream to allow for the late or delayed binding of the individual's identity to that data stream. In addition, the source of one or more additional data streams may be identified by cryptographically binding them to an original data stream. Other embodiments are described and claimed. | 03-12-2009 |
20090167486 | SECURE ASSOCIATION BETWEEN DEVICES - Methods and apparatus relating to secure association between devices are described. In one embodiment, devices capable of communicating via a wireless channel may be authenticated via a different channel established by signal generators and/or sensors present on the devices. Other embodiments are also disclosed. | 07-02-2009 |
20090167487 | SECURE ASSOCIATION BETWEEN DEVICES - Methods and apparatus relating to secure association between devices are described. In one embodiment, devices capable of communicating via a wireless channel may be authenticated via a different channel established based on observation of the same event by sensors present on the devices. Other embodiments are also disclosed. | 07-02-2009 |
20090327724 | TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed. | 12-31-2009 |
20100251052 | MULTIPLE PROTOCOL DATA TRANSPORT - Methods, media and systems are disclosed in which data is transferred from a data source apparatus to an application of a data receiving apparatus using both a first protocol and a second protocol. The data receiving apparatus identifies data received via the second protocol that has not been received via the first protocol, and delivers the identified data received via the second protocol to the application. | 09-30-2010 |
20110246213 | TECHNIQUES FOR OFFERING CONTEXT TO SERVICE PROVIDERS UTILIZING AN APPROVAL SERVICE AND INCENTIVES UTLIZING ONLINE SECURE PROFILE STORAGE - An embodiment of the present invention provides a method of offering incentive based context to service providers, comprising capturing context information of a user and distributing the context information to the service provider, the user capable of using a plurality of context capturing devices that all coordinate with an online secure profile storage service to provide a highly-available entity with which all the plurality of context capturing devices share profile information, wherein the profile storage service enables access to a user's profile by online services when any or all of the user's devices are offline, and wherein the service provider provides an incentive to the user for the context information. | 10-06-2011 |
20110246214 | TECHNIQUES TO IDENTIFY IN-MARKET PURCHASING INTERESTS - An embodiment of the present invention provides a method, comprising identifying in-market purchasing interests and representing them as a user goal to determine when a user is in-market for a specific product and to determine general shopping preferences and habits of the user, and wherein the goal has a timeline, and goal satisfaction can be identified via a variety of contextual inputs selected from the group consisting of: location; traces from online shopping activity; credit card bills; or a pay-by-phone transactions. | 10-06-2011 |
20110246273 | TECHNIQUES FOR MONETIZING ANONYMIZED CONTEXT - An embodiment of the present invention provides a method of offering anonymous incentive based context to service providers, comprising delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users. | 10-06-2011 |
20110246283 | APPROVAL SERVICE BASED TECHNIQUES FOR OFFERING CONTEXT TO SERVICE PROVIDERS UTILIZING INCENTIVES - An embodiment of the present invention provides a method, comprising offering incentive based context to service providers by capturing context information of a user and integrating an approval service to verify authorization for access to the user context and distributing the context information to the service provider, wherein the service provider provides an incentive to the user for the context information. | 10-06-2011 |
20110246300 | TECHNIQUES TO DETERME WHEN AN INTERNET USER IS IN-MARKET FOR A SPECIFIC PRODUCT AND DETERMINING GENERAL SHOPPING PREFERENCES AND HABITS OF INTERNET USERS - An embodiment of the present invention provides a method of determining when a user is in-market for a specific product and knowing general shopping preferences and habits of users, comprising using web browsing behavior to determine the products the user is interested in purchasing and how the user typically likes to shop and wherein the web browsing behavior is determined by watching some or all web pages loaded and analyzing at least a URL, page text, and cookies associated with each loaded web page. | 10-06-2011 |
20110246469 | TECHNIQUES TO CAPTURE CONTEXT AND LOCATION INFORMATION AND UTILIZE HEURISTICS TO TURN LOCATION TRACKED OVER TIME AND CONTEXT INFORMATION INTO SEMANTIC LOCATION INFORMATION - An embodiment of the present invention provides a method, comprising capturing context information of a user and using heuristics based on a common knowledge database to turn location tracked over time combined with the context information into semantic location information. Embodiments of the present invention may further provide creating and identifying said heuristics and wherein trace data of GPS coordinates are obtained continuously throughout the user's day and first clustered to identify interesting locations, then up-leveled to a street address or business name and then semantically interpreted in one of several categories. | 10-06-2011 |
20110247030 | INCENTIVES BASED TECHNIQUES FOR OFFERING CONTEXT TO SERVICE PROVIDERS UTILIZING SYNCRONIZING PROFILE STORES - An embodiment of the present invention provides a method, comprising creating a secure profile store to maintain a version of a user's profile on each of a plurality of platforms the user may be using, offering incentive based context to service providers by capturing context information of the user, wherein the platforms owned by the user will store a local version of the user's profile in the profile store. | 10-06-2011 |
20110251788 | GOALS BASED ROUTE OPTIMIZATION - An embodiment of the present invention provides an apparatus, comprising a personal device associated with a user adapted to optimize a route based on goals by predicting by the personal device associated with the user where the user is going and the user's degree of time flexibility in order to optimize a route and recommend specific stops along the way. The specific stops may be selected according to a number of goals that can be achieved at a specific stop. | 10-13-2011 |
20110251918 | RECOMMENDATION-GUIDED INTERNET PURCHASES UTLIZING CONTEXT DERIVED FROM A CONSTELLATION OF DEVICES - An embodiment of the present invention provides an Internet access device, comprising a processor adapted to provide recommendation-guided Internet purchases by identifying purchasing opportunities that would be directly relevant to a user of said Internet access device, wherein the Internet access device would utilize context received from the user's constellation of devices to develop a profile of the user's purchasing behavior, and automatically offer purchasing opportunities that are most likely to be of interest to the user. | 10-13-2011 |
20110251990 | TECHNIQUES FOR TEMPLATE-BASED PREDICTIONS AND RECOMMENDATIONS - An embodiment of the present invention provides a method of template-based prediction and recommendation, comprising utilizing templates that consist of a sequence of activities or locations to characterize a user's day by a personal device, wherein as the user goes about a day, the personal device attempts to match pre-existing templates to the user's location and activities, assigning a probability to each template; and using the matching templates to predict what the user will do next and thus narrow down a set of logical recommendations. | 10-13-2011 |
20110254772 | TECHNIQUES FOR RECOGNIZING MOVEMENT OF ONE OR MORE TOUCHES ACROSS A LOCATION ON A KEYBOARD GRID ON A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing movement of one or more touches across a location on a keyboard grid on a touch panel interface is disclosed. The method may receiving user input with a touch panel interface, recognizing movement of one or more touches across a location on a keyboard grid on the touch panel interface, and performing an action associated with the movement of one or more touches across the location on the keyboard grid on the touch panel interface. | 10-20-2011 |
20110254796 | TECHNIQUES FOR RECOGNIZING TEMPORAL TAPPING PATTERNS INPUT TO A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing temporal tapping patterns input to a touch panel interface is disclosed. The method may include receiving user input with a touch panel interface, recognizing a temporal tapping pattern in the user input, and performing an action associated with the temporal tapping pattern. | 10-20-2011 |
20110254797 | TECHNIQUES FOR RECOGNIZING MULTI-SHAPE, MULTI-TOUCH GESTURES INCLUDING FINGER AND NON-FINGER TOUCHES INPUT TO A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing multi-shape, multi-touch gestures including finger and non-finger touches input to a touch panel interface is disclosed. The method may include receiving user input with a touch panel interface, recognizing a multi-shape, multi-touch gesture including finger and non-finger touches in the user input, and performing an action associated with the multi-touch gesture including finger and non-finger touches. | 10-20-2011 |
20110254798 | TECHNIQUES FOR RECOGNIZING A SERIES OF TOUCHES WITH VARYING INTENSITY OR ANGLE OF DESCENDING ON A TOUCH PANEL INTERFACE - Briefly, a method and apparatus for recognizing a series of touches with varying intensity or angle of descending on a touch panel interface is disclosed. The method comprises receiving user input with a touch panel interface, recognizing a series of touches with varying intensity or angle of descending on the touch panel interface, and performing an action associated with the series of touches with varying intensity or angle of descending on the touch panel interface. | 10-20-2011 |
20110258203 | METHODS AND SYSTEMS FOR RELATIONSHIP CHARACTERIZATION AND UTILIZATION FROM A USER'S SOCIAL NETWORKS - An embodiment of the present invention provides a method of relationship characterization and utilization from a user's social network, comprising, using monitoring agents for the user's social network to create a unique profile of each contact in the social network by feeding data into a context aware framework, clustering raw data by extracting common interests and relevant keywords, thereby creating rich context-aware lists of keywords that characterize relationships among users of the social networks, and providing an interface to query the lists. | 10-20-2011 |
20110264553 | SYSTEMS, APPARATUS AND METHODS CAPABLE OF DELIVERING PURCHASE RECOMMENDATIONS BASED ON AN INTERACTIVE MOBILE SHOPPING APPLICATIONS - An embodiment of the present invention provides a mobile device, comprising a processor adapted to deliver purchase recommendations to a user of the mobile device based on an interactive mobile shopping application by interacting by the user with the mobile device, and on which the interactive mobile shopping application resides, to refine the user's interests and obtain recommendations for alternative products that may better fit the user's needs, and wherein the mobile device is further adapted to collect information about the user's in-market interests and overall shopping patterns thereby allowing opportunities for targeted advertising. | 10-27-2011 |
20110264613 | METHODS, APPARATUS AND SYSTEMS USING PROBABILISTIC TECHNIQUES IN TRENDING AND PROFILING - An embodiment of the present invention provides a mobile device, comprising a processor adapted to use probabilistic techniques in trending and profiling of a user of the mobile device's behavior in order to offer recommendations by detecting patterns in the user behavior over time and thereby enabling said mobile device to predict what the user is likely to do on a given day or what the user intends to accomplish in an action that has begun. | 10-27-2011 |
20110321073 | TECHNIQUES FOR CUSTOMIZATION - Techniques are disclosed that involve detecting and tracking groups of people associated with a user device (e.g., people watching television), and customizing the experience to the group. Various features may be employed. Such features may include classification of individuals, identification of commonly occurring groupings of people, and identification of the presence of group outsiders. Based on the presence of such individuals, groups, and/or outsiders, delivery of information to the user device may be controlled. | 12-29-2011 |
20120011538 | SYSTEM AND METHOD FOR PRIVACY-PRESERVING ADVERTISEMENT SELECTION - Methods and systems to provide targeted advertising in a subscription television setting, wherein the households that receive the targeted advertisement may retain anonymity. This may be achieved by marrying an anonymization protocol and infrastructure with a mechanism for STB selection and reporting. This anonymizes the set of households that are selected to play an ad, by ensuring that when an STB meets defined criteria and sends a ‘criteria met’ message (during the selection process) or ‘ad shown’ message (during a validation or counting process) to a head end, an STB or household identifier is not revealed, thus anonymizing the household information from the head end. In addition, this allows the head end to control the ad campaign process by advertising only to those households that meet specified criteria, and to count the number of actual instances in which an ad was displayed. The head end is able to count the number of times an ad was displayed, without knowing which particular household(s) viewed the ad. | 01-12-2012 |
20120057705 | TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed. | 03-08-2012 |
20120066715 | Remote Control of Television Displays - Video sources may be located on the Internet and particular videos at those sources may be selected for subsequent replay by using graphical controls provided, for example, in connection with a browser. These controls may permit the use of select, particular video segments for subsequent replay by adding them to a playlist. Then when the user has assembled the playlist in the order desired, the play of the playlist can be selected. The playlist video may then be displayed for the user on a remote display, such as a high definition television display. At the same time, the user's computer screen may display a control view which allows the user to view and add annotations and to control the play of a video on the high definition television screen. | 03-15-2012 |
20120079517 | VIEWERSHIP-BASED SERVICES - A method, system, and computer program product containing instructions to provide viewership-based services. In response to a request to participate in a service transaction by a user of a service, a viewership status of the user is determined with respect to an episode of a series of episodes. The service transaction is modified to accommodate the viewership status of the user. Modifying the service transaction may include providing content related to a first episode in the series if the viewership status indicates the user has viewed the first episode and withholding content related to a second episode in the series if the viewership status indicates that the user has not viewed the second episode. Modifying the service transaction may include writing a post by the user to a collection of posts that is accessible only by users having a given viewership status. | 03-29-2012 |
20120079518 | Validation of TV viewership utlizing methods, systems and computer control logic - A method, system and computer control logic to provide personalization of a viewer's usage of an Internet TV platform. The method includes tracking a viewer's interactive usage pattern of the TV platform; generating viewer usage data based on the tracking; analyzing the viewer usage data on a substantially real-time basis; and personalizing the viewer's usage of the TV platform on a based on an analysis the viewer usage data. | 03-29-2012 |
20120079521 | INCENTIVIZING ADVERTISEMENT VIEWING AND VALIDATING ASSOCIATED PURCHASE - A system and method are configured to provide an incentive to one or more viewer(s) to view (watch) one or more displayed advertisement(s), to notify advertiser(s) that the viewer(s) viewed the advertisement(s) and to identify one or more purchase(s) associated with the viewed advertisement(s). | 03-29-2012 |
20120246000 | TECHNIQUES TO CAPTURE CONTEXT AND LOCATION INFORMATION AND UTILIZE HEURISTICS TO TURN LOCATION TRACKED OVER TIME AND CONTEXT INFORMATION INTO SEMANTIC LOCATION INFORMATION - An embodiment of the present invention provides a method, comprising, capturing context information of a user and using heuristics based on a common knowledge database to turn location tracked over time combined with the context information into semantic location information. | 09-27-2012 |
20120246065 | TECHNIQUES FOR OFFERING CONTEXT TO SERVICE PROVIDERS UTILIZING INCENTIVES - An embodiment of the present invention provides a method of offering incentive based context to service providers, comprising capturing context information of a user and distributing said context information to said service provider, wherein said service provider provides an incentive to said user for said context information, and wherein said user may choose all or a subset of said context information for varying types of compensation selected from the group consisting of: No compensation; Direct monetary compensation; Indirect monetary compensation; Non-monetary compensation; or Points, credits, access to free content. | 09-27-2012 |
20120246684 | SYSTEMS, APPARATUS AND METHODS USING PROBABILISTIC TECHNIQUES IN TRENDING AND PROFILING AND TEMPLATE-BASED PREDICTIONS OF USER BEHAVIOR IN ORDER TO OFFER RECOMMENDATIONS - An embodiment of the present invention provides a method of using probabilistic techniques in trending and profiling of user behavior in order to offer recommendations, comprising detecting patterns in user behavior over time thereby enabling a personal device associated with said user to predict what the user is likely to do on a given day or what the user intends to accomplish in an action that has begun. | 09-27-2012 |
20120253920 | SYSTEM AND METHOD FOR VIEWERSHIP VALIDATION BASED ON CROSS-DEVICE CONTEXTUAL INPUTS - Systems and methods to identify a viewer's reactions to an advertisement. A viewer's personal computing platforms (e.g., personal computer, cell phone, etc.), for example, may be utilized to identify user actions. Actions identified through such devices may validate that an advertisement was viewed and acted upon. After an advertisement is presented, the viewer may take any of several actions. A viewer may browse for the advertised product, either online or in a physical store. The viewer may ultimately purchase the advertised product. The user may share information about the product with friends. The reaction of the viewer may be monitored, by capturing context data associated with activity performed using the viewer's personal computing platforms for example. This data may then be correlated with metadata regarding the advertisement. If it is determined that the viewer investigated or purchased the product within a predefined time after being exposed to the advertisement, then this fact may be tallied anonymously. The number of such matches across a set of viewers may be recorded and reported to an audience measurement service. In an embodiment, such data may be sold to an advertiser. | 10-04-2012 |
20120328096 | TWO-WAY AUTHENTICATION BETWEEN TWO COMMUNICATION ENDPOINTS USING A ONE-WAY OUT-OF-BAND (OOB) CHANNEL - Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed. | 12-27-2012 |
20130271452 | MECHANISM FOR FACILITATING CONTEXT-AWARE MODEL-BASED IMAGE COMPOSITION AND RENDERING AT COMPUTING DEVICES - A mechanism is described for facilitating context-aware composition and rendering of virtual models and/or images of physical objects computationally composited and rendered at computing devices according to one embodiment of the invention. A method of embodiments of the invention includes performing initial calibration of a plurality of computing devices to provide point of view positions of a scene according to a location of each of the plurality of computing devices with respect to the scene, where computing devices of the plurality of computing devices are in communication with each other over a network. The method may further include generating context-aware views of the scene based on the point of view positions of the plurality of computing devices, where each context-aware view corresponds to a computing device. The method may further include generating images of the scene based on the context-aware views of the scene, where each image corresponds to a computing device, and displaying each image at its corresponding computing device. | 10-17-2013 |
20130283304 | Validation of TV Viewership Utilizing Methods, Systems and Computer Control Logic - A method, system and computer control logic to provide personalization of a viewer's usage of an Internet TV platform. The method includes tracking a viewer's interactive usage pattern of the TV platform; generating viewer usage data based on the tracking; analyzing the viewer usage data on a substantially real-time basis; and personalizing the viewer's usage of the TV platform on a based on an analysis the viewer usage data. | 10-24-2013 |
20140046743 | TECHNIQUES FOR MONETIZING ANONYMIZED CONTEXT - An embodiment of the present invention provides a method of offering anonymous incentive based context to service providers, comprising delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users. | 02-13-2014 |
20140046749 | TECHNIQUES FOR MONETIZING ANONYMIZED CONTEXT - An embodiment of the present invention provides a method of offering anonymous incentive based context to service providers, comprising delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users. | 02-13-2014 |
20140096241 | CLOUD-ASSISTED METHOD AND SERVICE FOR APPLICATION SECURITY VERIFICATION - A method, device, and system for browser-based application security verification is disclosed. A client device requests a browser-based application from a web server. An application security module of the client device intervenes and transmits an application verification request to a cloud service system. The cloud service system retrieves data regarding the security of the application and source from cloud resources and a local database of the cloud server. The cloud service system then uses the data to authenticate the source and verify the security of the browser-based application. The cloud service system provides the client device with a recommendation regarding the security of the browser-based application and updates its local database. The client device may then consider the recommendation in determining whether to download or execute the browser-based application and provide feedback to the cloud service system. The client device may also perform a local security analysis after receiving the cloud service system's recommendation. | 04-03-2014 |
20140146721 | METHODS AND APPARATUS FOR PROVIDING AN INTEGRATED MULTI-HOP ROUTING AND COOPERATIVE DIVERSITY SYSTEM - Embodiments of methods and apparatus for providing an integrated multi-hop routing and cooperative diversity system are generally described herein. Other embodiments may be described and claimed. | 05-29-2014 |
20140173089 | CLOUD DATA STORAGE LOCATION MONITORING - Technologies for monitoring data storage location for cloud data include a cloud monitoring server configured to communicate with one or more cloud customer computing devices and cloud service providers. The cloud monitoring server receives monitoring requests from the cloud customer computing devices and retrieves provider information from the cloud service providers. The cloud monitoring server compiles response data based on the monitoring requests and the provider information, and sends response data to the cloud customer computing devices. Cloud customer computing devices may send on-demand monitoring requests and/or continuous, policy-based monitoring requests. For policy-based monitoring, the cloud monitoring server continually monitors the provider information and provides response data when one or more conditions specified in the policy are satisfied. The cloud monitoring server may also make recommendations and provide feedback based on the monitoring requests or the provider information. Other embodiments are described and claimed. | 06-19-2014 |
20140181489 | CLOUD TRANSFORMABLE DEVICE - Technologies for performing a platform transformation on a computing device include transforming a transformable component of the computing device from a first hardware configuration in which a first set of hardware features is enabled to a second hardware configuration in which different hardware features are enabled. The computing device has a first capability when in the first configuration and a different capability when in the second configuration. In performing the platform transformation, the computing device determines a platform transformation build, establishes a communication connection with a cloud-based platform transformation service, and identifies and retrieves relevant platform definitions from the cloud-based platform transformation service. The platform definitions are used in effecting the desired platform transformation. | 06-26-2014 |
20140189120 | AD HOC DECENTRALIZED CLOUD INFRASTRUCTURE - Technologies for establishing and utilizing a decentralized cloud infrastructure using a plurality of mobile computing devices include broadcasting for the formation of the decentralized cloud computing and storage infrastructure and establishing wireless communications between the plurality of mobile computing devices. The plurality of mobile computing devices self-organize and cooperate with one another to establish a structured decentralized cloud infrastructure to expose and sharing resources, services, and/or applications for ad hoc or socially-driven decentralized, cloud computing purposes. | 07-03-2014 |
20140194146 | LOCATION-BASED APPLICATION RECOMMENDATION - Described herein are techniques related to location-aware application recommendations in wireless devices. For example, an application recommendation alert may be displayed at the wireless device based on a current location, time, and data of the wireless device. Further, relevant applications to user location based on where the wireless device that are placed for sale at the market may be displayed at the wireless device. | 07-10-2014 |
20140215507 | PERSONALIZED PASSIVE CONTENT DELIVERY - Various embodiments are directed to a media processing device that can create a personalized passive viewing experience for a user. A personalization engine may determine viewer preferences based on multiple factors including past viewing behavior, web-browsing history, calendar event topics, and email data topics. The viewer preferences may then be formed into a user profile. A content aggregator component may then search multiple content sources for content compatible with the user profile. The content aggregator component may save found content or pointers to the content for later reference. The personalization engine may organize the saved content into a series of individual content items which may be presented on a display. Other embodiments are described and claimed. | 07-31-2014 |
20140340992 | SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR HUMAN PRESENCE DETECTION BASED ON AUDIO - Methods, systems and computer program products that allow for the determination of human presence in a room where content is being presented. The audio that is associated with the content may be captured, along with the audio that is being generated collectively by whatever sources may be in the room including the presentation of the content. Features may be extracted from both the content audio and the room audio. These features may then be compared, and the differences may be quantified. If the differences are significant, then human presence may be inferred. | 11-20-2014 |
20150058629 | Processing Data Privately in the Cloud - While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data. | 02-26-2015 |
20150084871 | CUSTOMIZED DISPLAY AND FUNCTION FOR KEYS ON A KEYBOARD - An electronic device is described herein. The electronic device includes a keyboard and a plurality of keys arranged on the keyboard. The plurality of keys may include dynamically customized keys based on usage. The display and function of the customized keys may be enabled through the use of platform components and cloud services on the keyboard. The customized keys may include generic, customer-specific, or dynamically updated images. | 03-26-2015 |