Patent application number | Description | Published |
20110151397 | ORAL APPLIANCE ACTIVATION DEVICES AND METHODS - Oral appliance activation devices and methods which are used to facilitate the securement, adjustment, or removal of an oral appliance, e.g., a crown or bridge, from a reconfigurable abutment assembly are described. The adjustable abutment assembly may be secured to an anchoring implant bored into the bones within the mouth. The abutment assembly has a projecting abutment portion with one or more shape memory alloy elements extending along the projecting abutment portion. Energy may be applied to the elements via the activation devices directly over or adjacent to the oral appliance to actuate the elements and thereby either secure or loosen the oral appliance relative to the abutment. | 06-23-2011 |
20110171599 | SHAPE MEMORY DENTAL RETENTION SYSTEMS - Shape memory dental retention systems which facilitate the adjustment or removal of an oral appliance, e.g., a crown or bridge, from a reconfigurable abutment assembly are described. The adjustable abutment assembly may be secured to an anchoring implant bored into the bones within the mouth. The abutment assembly has a projecting abutment portion with one or more shape memory material sleeves or plates or elements extending along the abutment. Each of the sleeves has a length with at least one curved or arcuate portion. Energy may be applied to the elements such that the arcuate portion flattens to allow for the oral appliance to be placed thereupon while removal of the energy allows the elements to reconfigure into its curved configuration thereby locking the oral appliance to the abutment. Removal of the oral appliance may be effected by reapplication of energy to the elements. | 07-14-2011 |
20120202173 | ABUTMENT DEVICES AND METHODS FOR NATURAL TEETH - Root canal abutment devices and methods which facilitate the adjustment or removal of an oral appliance, e.g., a crown or bridge, from a reconfigurable abutment assembly are described. The adjustable abutment assembly may be secured within a pulp chamber of a pre-existing tooth. The abutment assembly has a projecting abutment portion with one or more shape memory alloy sleeves or plates or elements extending along the abutment. Each of the sleeves has a length with at least one curved or arcuate portion. Energy may be applied to the elements such that the arcuate portion flattens to allow for the oral appliance to be placed thereupon while removal of the energy allows the elements to reconfigure into its curved configuration thereby locking the oral appliance to the abutment. Removal of the oral appliance may be effected by reapplication of energy to the elements. | 08-09-2012 |
20130177873 | SHAPE MEMORY DENTAL RETENTION SYSTEMS - Shape memory dental retention systems which facilitate the adjustment or removal of an oral appliance, e.g., a crown or bridge, from a reconfigurable abutment assembly are described. The adjustable abutment assembly may be secured to an anchoring implant bored into the bones within the mouth. The abutment assembly has a projecting abutment portion with one or more shape memory material sleeves or plates or elements extending along the abutment. Each of the sleeves has a length with at least one curved or arcuate portion. Energy may be applied to the elements such that the arcuate portion flattens to allow for the oral appliance to be placed thereupon while removal of the energy allows the elements to reconfigure into its curved configuration thereby locking the oral appliance to the abutment. Removal of the oral appliance may be effected by reapplication of energy to the elements. | 07-11-2013 |
20130331931 | Apparatus for Replacing a Native Heart Valve and Method of Making the Same - An apparatus for replacement a native heart valve is herein provided. The apparatus includes a replacement heart valve, an expandable anchor, and a plurality of rivets. The expandable anchor comprises a woven braid structure that surrounds at least a portion of the replacement heart valve and has a plurality of braid intersections. At least some of the braid intersections have rivets extending therethrough. | 12-12-2013 |
20150132717 | DENTAL PROSTHESES DEVICES AND METHODS - Root canal abutment devices and methods which facilitate the adjustment or removal of an oral appliance, e.g., a crown or bridge, from a reconfigurable abutment assembly are described. The adjustable abutment assembly may be secured within a pulp chamber of a pre-existing tooth. The abutment assembly has a projecting abutment portion with one or more shape memory alloy sleeves or plates or elements extending along the abutment. Each of the sleeves has a length with at least one curved or arcuate portion. Energy may be applied to the elements such that the arcuate portion flattens to allow for the oral appliance to be placed thereupon while removal of the energy allows the elements to reconfigure into its curved configuration thereby locking the oral appliance to the abutment. Removal of the oral appliance may be effected by reapplication of energy to the elements. | 05-14-2015 |
20150335423 | APPARATUS FOR REPLACING A NATIVE HEART VALVE AND METHOD OF MAKING THE SAME - An apparatus for replacement a native heart valve is herein provided. The apparatus includes a replacement heart valve, an expandable anchor, and a plurality of rivets. The expandable anchor comprises a woven braid structure that surrounds at least a portion of the replacement heart valve and has a plurality of braid intersections. At least some of the braid intersections have rivets extending therethrough. | 11-26-2015 |
Patent application number | Description | Published |
20090235077 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 09-17-2009 |
20100205471 | NETWORK BASED SYSTEM TO CONTROL AND MONITOR POWER CONSUMPTION OF NETWORKED ELEMENTS - In an example embodiment, a technique for network based power management for power consuming devices associated with a network. A power control strategy is communicated to network elements coupled to the network. The power control strategy is enforced by the network elements and the network elements report power consumption. Each network element enforces the power strategy relative to the set of power consuming devices operatively associated with the network element. Groups of subtended network elements can manage the power policy in a cluster power management mode or in a collaborative cluster management mode. | 08-12-2010 |
20120155395 | Client modeling in a forwarding plane - In one embodiment, a method includes receiving a packet at a network device in communication with a plurality of client nodes, the packet identifying a first client node, performing a look up in a table stored at the network device to locate policies associated with the first client node, the table including an entry for each of the client nodes, each entry having a plurality of policies associated with the client node, applying the policies associated with the first client node at a forwarding engine at the network device, and forwarding the packet from the network device. An apparatus is also disclosed. | 06-21-2012 |
20120210395 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 08-16-2012 |
20130333012 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 12-12-2013 |
20150312091 | SELECTION OF ANCHOR CONTROLLERS FOR CLIENT DEVICES WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that configure a first controller, of a plurality of controllers, as a primary controller for maintaining data associated with each particular device of a plurality of devices, for each particular device of the plurality of devices, select a respective secondary controller, from the plurality of controllers, for maintaining data associated with that particular device based on a respective identifier associated with that particular device, subsequent to selecting the secondary controller for each particular device of the plurality of devices, detect an error associated with the first controller, and responsive to detecting the error associated with the first controller, establish the secondary controller selected for each particular device, based on the respective identifier, as the primary controller for that particular device. | 10-29-2015 |
20150312140 | Method and System for Handling Failure in a Coordinated Multicast Streaming System - According to one embodiment of the invention, a non-transitory computer readable medium for handling the failure of a controller within a communications network is provided. One embodiment of the non-transitory computer readable medium comprises instructions that cause a secondary network device to identify one or more multicast streams received by a primary network device and detect that the primary network device has failed; and responsive to detecting that the primary network device has failed, cause the secondary network device to subscribe to the multicast streams. | 10-29-2015 |
20150312819 | USER ANCHOR CONTROLLER COMMUNICATION WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that configure, by a first controller, a first access point, responsive to a client device associating with the first access point, identify a second controller configured for maintaining information corresponding to the client device, wherein the second controller is different than the first controller that configures the first access point, obtain, by the first access point from the second controller, information corresponding to the client device, and communicate, by the first access point with the client device, based on the information corresponding to the client device. | 10-29-2015 |
20150312820 | SELECTION OF ANCHOR CONTROLLERS FOR ACCESS POINTS WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that select a first controller for controlling a configuration of a first access point and a second access point, detect a particular event and, responsive to detecting the particular event, select a second controller for controlling the configuration of the first access point without modifying the selection of the first controller for controlling the configuration of the second access point. | 10-29-2015 |
20150327024 | Multicast Transmissions in a Network Environment With User Anchor Controllers - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that determine whether a same data stream is being received by a first access point from each of two or more network devices of a plurality of network devices, responsive at least to the determining operation, select a particular network device, of the plurality of network devices, for transmitting the data stream to the first access point, and configure the plurality of network devices such that the particular network device transmits the data stream to the first access point without any other network devices in the plurality of network devices transmitting the same data stream to the first access point. | 11-12-2015 |
20160036683 | SYNTHETIC CLIENT - A system with a device including a hardware processor is configured to perform operations: receiving, by the device, a message over a wired medium, wherein the message has a frame including (a) a MAC address as a source MAC address for the frame and (b) a second MAC address as a destination MAC address for the frame, extracting, by the device, the frame from the message received over the wired medium, and wirelessly transmitting, by the device, the frame without modifying the source MAC address and without modifying the destination MAC address. | 02-04-2016 |
Patent application number | Description | Published |
20120206263 | EAS TAG WITH ARMING SWITCH - An EAS tag has an arming switch protruding from its body to detect when the EAS tag is being forcibly removed from an object to which it is attached. A plate covers the arming switch to provide a broader surface for interacting with the attached object. The plate is capable of floating and moving when it is impinged upon by an attached object. When moved by an object when the EAS tag is attached to an object, the plate actuates the arming switch and changes its state. This can arm the EAS tag or can be a step in the arming process of the EAS tag. When the EAS tag is forcibly removed from an object, the plate and arming switch are released, and electronics onboard the EAS tag determine an alarm condition. | 08-16-2012 |
20120241522 | EAS TAG WITH TWIST PREVENTION FEATURES - An EAS tag includes a cap with a tack shaft and a body with a clutch for receiving and retaining the tack shaft. An aperture in the body gives access to the clutch. The cap is concave and shaped to fit over the body, and the tack shaft extends into the concavity of the cap. The shape of the body and cap and the position of the tack shaft provide an initial resistance to twisting the cap with respect to the body. Both the cap and body may have additional features with interact or interlock to prevent the cap from being twisted. Additional, the cap may have areas of reduced thickness to induce breaking away of parts of the cap when excessive stress is induced in the cap. | 09-27-2012 |
20120267436 | EAS TAG WITH SHACKLE - An EAS tag has a housing and a shackle. The shackle has a first segment with a first end and a second segment with a second end. The first segment of the shackle is slidably mounted in the housing while the second segment moves in and out of the housing in accord with the first segment. When the second segment is out of the housing, the shackle can be placed through an aperture in an object to be protected or around a portion of an object to be protected. The shackle is then slid into the housing so that the second segment inserts into the housing. A clutch within the housing prevents the shackle from being shifted until the clutch is released. The housing carries at least a passive EAS element. More advanced EAS electronic elements may also be carried in the housing. | 10-25-2012 |
20130002430 | ANTI-THEFT DEVICE - An anti-theft device monitors objects having a shaft, strap, or similar element. The anti-theft device is comprised of a two components hingably connected together. The two components can move from an open position to a closed position to enclose the shaft or similar element. One component has a first latch element and contains electronics including an arming switch. When the two components are moved to the closed position, the other component changes the status of the arming switch. The other component has a second latch element which combines with the first latch element to hold the two components in the closed position. The anti-theft device may be armed or disarmed by a remote device. The latching elements may be releasably lockable and may be released by a magnet. The anti-theft device may have passcode protection capabilities. | 01-03-2013 |
20130119145 | EAS Tag With Benefit Denial Features - An EAS tag includes a cap component with a tack shaft. The cap component is contoured to engage with a body component. The body component has a clutch for receiving and retaining the tack shaft. The shape of the body component and the cap component, along with the position of the tack shaft, provide an initial resistance to twisting the cap with respect to the body. Both the cap and body components may have additional features which interact or interlock to prevent the cap from being twisted. Additionally, the EAS tag may incorporate a staining agent-based benefit denial system. The EAS tag is further adapted to be reusable after actuation of the benefit denial system, and includes a visual indication of a compartment containing a staining agent to serve as a visual deterrent to shoplifters. | 05-16-2013 |
20130257619 | METHOD AND APPARATUS TO DEACTIVATE EAS MARKERS - This invention relates to a method and apparatus for deactivating EAS markers. The device utilizes deactivating magnetic fields created by energizing electrical coils to deactivate electronic article surveillance markers. It consists of housing having an internal structure holding an electrical coil arrangement. The coil arrangement comprises two electrical coils that are arranged essentially coplanar, arranged side-by-side. A third electrical coil is arranged such that each of its windings wraps around both the first and said second electrical coils. Current flowing through the coils generates a composite deactivating magnetic field above the housing. This deactivating magnetic field allows deactivation of a tag swept in any orientation, and does not require the tag to come into physical contact with the deactivating device. Flush mounting conserves space, allowing for ease of merchandise movement over the counter. A distinctive sound indicates the presence and deactivation of the label. | 10-03-2013 |
20130321153 | EAS TAG FOR BOTTLES - An anti-theft device monitors bottles. It is comprised of a two components hingably connected together. They can move from an open position to a closed position to enclose the neck of a bottle. One component has a first latch element and contains electronics including an arming switch. The other component has a second latch element. The latch elements combine to hold the two components in the closed position. When the two components are moved to the closed position, and a bottle is in position, the bottle changes the state of the arming switch. One of the components, or both, may have a protrusion that engages a feature on the bottle to keep the tag in place on the bottle. The anti-theft device may be armed or disarmed by remote devices. The latching elements may be releasably lockable such as by a magnet. The anti-theft device may have passcode protection capabilities. | 12-05-2013 |
20130321154 | EAS Tablet Housing - An EAS device with a housing. In one embodiment, the EAS housing is a one-piece tray-shaped device with the edges contoured so that the monitored object snaps into the tray or is slid into the tray. Other embodiments may include but are not limited to a two piece housing where one piece of the housing has a protrusion which, when closed together and fitted with the other piece of the housing, engages with a releasable clutch located within the back piece. A clutch within the housing prevents the two pieces of the housing from being disengaged until the clutch is released. The EAS devices carry at least a passive EAS element. More advanced EAS electronic elements may also be carried in the housing. | 12-05-2013 |
20140043163 | ASSET PROTECTION SYSTEM - An asset protection system uses a plurality of radiate and detect units to maintain a radio frequency field, or signal, in a monitored area. Each unit has a unique unit identifier code which it modulates onto its transmission of the field, and a zone where its transmission of the field will dominate. Assets have tags attached to them. The tags have a mechanism to attach them to the objects and have electronic components on board including a microprocessor, motion detector, radio frequency circuitry, audible alarm generator. The tags receive the field and when they are in a zone dominated by a unit, demodulate that units identifier code. The tags transmit a signal at a different frequency with the unit identifier code and its tag identifier code in the signal. The unit receives the tag signal with its code on it and adds the tag to the inventory for its area. | 02-13-2014 |
20140071643 | Anti-Theft Hang Tag - An anti-theft device comprised of a housing hingably connected to a cover. The housing and cover can move from an open position to a closed position to clasp and secure an article to be monitored. The housing and cover have latch components. When the housing and cover are rotated to a closed position in relation to one another, a latch component on the cover interconnects with a latch component of the housing to hold the housing and cover in a closed position. The latch components may be releasably lockable and may be released by application of a magnet to a blocking component in the housing which has a magnetically-attractable element associated with it, combined with manual manipulation of a latch switch to disengage the latching components of the housing and cover. The anti-theft device carries at least a passive electronic article surveillance element. More advanced electronic article surveillance elements may also be carried in the housing. | 03-13-2014 |
20140077953 | EAS TAG USING CONDUCTIVE WRAPPING ELEMENT - An electronic article surveillance apparatus for monitoring objects is comprised of a base, at least one electrically conductive wrapping element, and an electronics housing. The conductive wrapping element is long enough to wrap around an object to be protected and may be carried by a section of tape. The base rests on an object to be monitored, and the housing releasably latches onto the base, while each conductive element wraps around the object with each end of conductive element fixed between the base and housing. Electronics within the housing complete a circuit through each conductive element and monitor for continuity. If continuity is lost, either by cutting a conductive element, or unauthorized unlatching of the housing, an alarm can be sounded by the electronics within the housing. The electronic housing may be disarmed by a remote device and delatched from the base. Adhesive may be used to install the apparatus. | 03-20-2014 |
20140159902 | One Time Use Multi-Function Tag - An anti-theft tag has two slightly concave shells attached to each other by a hinge. One shell has an aperture through it and the other shell has a post located to insert through the aperture when the two shells are brought together. At least one catch tab extends laterally from the end of the post. The catch tab exceeds the width of the aperture and is constructed to give to allow the post to insert into the aperture, but to resist and prevent the extraction of the post. The post is severable to allow the remove of the catch tab to allow the opening of the tag. One of the shells also has a slot and the other has a tack. When the post is inserted through the aperture, the tack inserts into the slot. The tack passes through an object to be protected and maintains the tag in place. | 06-12-2014 |
20140232545 | ONE TIME USE TAG - Embodiments of the current invention entail a highly visible tag that can be attached to a product at a highly visible location on the product at a store, but can easily be removed once the purchaser buys the product and takes it home. Once the purchaser gets the product home, they can remove it themselves and use it in public. Once the tag is removed, it cannot be reattached by the consumer. Depending on the store policy, the product may not be returned, or an extra fee charged for returning the garment, or other similar policies. Absence of a tag makes it clear that the buyer has removed the tag and provides an indication that the product, such as a garment has been used or worn in public. The tag is most effective for products that are used in public, such as garments. The tag may carry EAS technology. | 08-21-2014 |
20140253290 | ELECTRONIC ARTICLE SURVEILLANCE RELAY DEVICE - An electronic article surveillance device attaches to an object having an electronic article surveillance RFID label in it. The EAS device interrogates the label for information and associates itself with the label. The device retransmits the information from the label to the broader system and over a longer range than the label can by itself. The device has a motion detector and periodically interrogates the label to insure the presence of the label, especially when motion is detected. The unexpected absence of the label is considered an alarm condition and the device will alarm in those circumstances. External devices arm and disarm the device and detach the device as well. | 09-11-2014 |
20150048947 | EAS TAG UTILIZING MAGNETOMETER - An EAS tag comprises a microprocessor, motion sensor, magnetometer, communication elements, and audible alarm generator. Various means of attaching the tag to an object to be protected can be used. The magnetometer can measure the magnetic fields around it and digitally transmit the information to the microprocessor for storage. After a certain period of inactivity as measured by the motion sensor, the tag enters a state of reduced activity to conserve energy. When the motion sensor determines that the tag is being moved, the magnetometer takes a current snapshot which is compared to a previous snapshot. If the two images differ over certain percentage, the tag alarms. The tag can also monitor the ambient magnetic fields in real time and, when the fields change abruptly, the tag alarms. This prevents defeating the tag by placing it in a metallic foil bag. | 02-19-2015 |
20150137977 | EAS TAG FOR BOTTLES - An anti-theft device monitors bottles. It is comprised of a two components hingably connected together. They can move from an open position to a closed position to enclose the neck of a bottle. One component has a first latch element and contains electronics including switches. The other component has a second latch element. The latch elements combine to hold the two components in the closed position. When the two components are moved to the closed position, and a bottle is in position, the bottle contacts elements which in turn change the states of associated switches. One of these elements also functions to retain the bottle on the tag. The anti-theft device may be armed or disarmed by remote devices. The latching elements may be releasably lockable such as by a magnet. The anti-theft device may have passcode protection capabilities. | 05-21-2015 |
20150161863 | ANTI-FRAUD TAG - A highly visible single use tag prevents the fraudulent return of garments. Two members are connected by a hinge. The hinge allows the members to move from an open configuration to a closed configuration where the members form and enclose a space. Complementary latch elements on the members engage and hold the members in the closed configuration. At least one of the members has a tack extending inwardly into the space enclosed by the members. This tack pierces a garment intended to be protected by the tag and maintains the tag on the garment. At least one of the members has at least one perforated line across the width of the member. This perforated line allows that member to be pulled apart and the tag removed without the need of any tool to do so. | 06-11-2015 |
20150302711 | EAS DEVICE HAVING INTERCHANGEABLE CONTOURED BASE - An electronic article surveillance device attaches to an object to be protected. The EAS device has a base, or mount, and a housing which contains EAS electronics. The housing and base are separate but have elements which act together to attach the housing to the base. The base attaches to the object and has a surface contoured to fit the contour of the object to be protected. The base, or mount, may be attached to the object by an adhesive element. Multiple interchangeable bases having differently countered surfaces allow a housing to be attached to different objects having different contours. | 10-22-2015 |
20150356843 | CLOUD EAS SYNCHRONIZATION AND FIRMWARE UPDATE - A system and method provides access to antennas of an electronic article surveillance system via WiFi and the Internet. Each antenna of the EAS system has a WiFi chip associated with its controls and the WiFi chip relays the antennas operating parameters as well as its reading of electromagnetic noise in its environment to the Internet. A remote technician can review the information provided by the antennas of the EAS system and optimize their operation with each other and their environments. In some embodiments, remote software can optimize the operation of the EAS system antennas. In some embodiments, the WiFi chip is an aftermarket addition. | 12-10-2015 |
Patent application number | Description | Published |
20110258027 | POINT-OF-SALE PROMOTIONS - A method and a system to publish a promotion at a point-of-sale are provided. For example, a preliminary selection associated with a purchase from a user may be received. A promotion may be published to the user at a point-of-sale associated with the purchase after the user makes the preliminary selection and before the user finalizes the purchase. The promotion may be based on at least one attribute of past transactions and the preliminary selection. | 10-20-2011 |
20120041820 | MACHINE TO STRUCTURE DATA AS COMPOSITE PROPERTY - Information pertinent to an item or product may be organized (e.g., structured) as a property of the item or product. The property may be represented (e.g., stored) as property data in a data structure of the item or product. A property may have one or more properties of its own. In this manner, information pertinent to items, products, properties, or any suitable combination thereof may be structured with any level of sophistication or complexity. Accordingly, a data structure may be generated to contain one or more properties of an item or product, as well as to contain one or more properties of those properties. A “composite property” refers to such a data structure and may be indexed based on a value contained therein. The value may be used to identify the item or the product, for example, as an instance of a virtual product. | 02-16-2012 |
20130246196 | SYSTEM AND METHOD TO PROMOTE A PUBLICATION - A method and a system to promote a publication are provided. In example embodiments, data is received from a user that is used to create a publication for placement on a networked-based system. An indication to promote the publication on the networked-based system is received. A user interface through which the user selects an option to promote the publication on the network-based system is presented. The publication is published on the network-based system, whereby the publication is promoted based on the option selected to promote the publication. | 09-19-2013 |
20140195620 | NOTIFICATION ROUTING TO A USER DEVICE - A system, machine-readable storage medium storing at least one program, and computer-implemented method for routing a notification to at least one device of a user is provided. User preference data including usage data is obtained from a user. The usage data may relate to activity of the user on at least one device and may indicate a preference of the user in receiving notifications on the at least one device. The occurrence of a notification event is detected. In response to the detection of the notification event, a notification is communicated to the user in accordance with the user preference data. The notification may indicate that a notification event has occurred. | 07-10-2014 |
20140308977 | PASSIVE CHECK-IN - A system to effectuate passive check-in with respect to a user's mobile device is described. A server system may be configured to receive communications from a GPS-enabled mobile device (e.g., a mobile phone), extract a stream of locations from the received communications, and use the location information to determine whether a boundary-crossing event has occurred with respect to the mobile device. In response to detecting a boundary-crossing event, the server may communicate a message, such as a recommendation, to the mobile device. | 10-16-2014 |
20150012433 | MOBILE IDENTITY - A user may have multiple online identities used to access multiple online services. The user may use the multiple online identities from a device. The system may detect that the multiple online identities connect from the device and determine that the multiple online identities are all associated with the user. Based on the common identification, various features may be enabled, including fraud detection and targeted advertising. | 01-08-2015 |
20150156192 | FEDERATED IDENTITY CREATION - A user may have multiple identities used to access multiple services or accounts. The user may use the multiple identities online from a device. The system may detect that the multiple identities connect from the device and determine that the multiple online identities all have associated relationships with the user. A federated user identifier may, accordingly, be created. Based on the common identification, various features may be enabled, including fraud detection and targeted advertising. | 06-04-2015 |
20150264113 | Dynamic Batching - An application running on a user device may communicate with a server application. The server application may track user actions on the device. The user actions may be transmitted from the user device to the server application using data packets. Each data packet may include header information and information regarding one or more user actions (the “batch”). The number of user actions to include in each batch may be determined by the OS, by the application, by the user, by the network, the number of actions in the batch, the size of the data in the batch, the time elapsed between the first and last action in the batch, or any suitable combination thereof. A communication server may recognize a batch data packet and divide it into individual data packets. | 09-17-2015 |