Patent application number | Description | Published |
20090012841 | EVENT COMMUNICATION PLATFORM FOR MOBILE DEVICE USERS - A method, system, and apparatus are directed to communicating data over a network. Event attributes comprising at least two of a temporal, spatial, social, or topical information are received. An event structure comprising fields associated with a different one of a temporal, spatial, social, or topical dimension based on the received event attributes is generated. An advertising attributes about an advertisement is received. The advertising attributes may comprise at least two of another temporal, spatial, social, or topical information. If the event structure matches the advertising attributes, the advertisement may be provided co-located with the event structure. The advertisement may be configured to provide a value exchange if the advertisement is activated. | 01-08-2009 |
20090135002 | MOBILE DEVICE TRACKING AND LOCATION AWARENESS - A system is provided for tracking a mobile device by enabling a user to remotely monitor the external surrounding environment of the mobile device. Initially, a mobile device is configured to selectively report on the device's surrounding environment based on one or more reporting events. Upon an occurrence of a reporting event, the mobile device generates a report by capturing at least one sensory datum related to its external surrounding environment. At least one locating datum is included in the report which can provide at least an approximate geographic location of the mobile device at the time the report is generated. Once the report is generated, the mobile device selectively sends the report to a tracking assist server, which makes the report remotely accessible to the user. Accordingly, when a mobile device is missing, a user can review one or more reports accessible on the server to determine whether the mobile device is stolen. Additionally, the at least one sensory datum provided in the one or more reports can be used to assist the user or others in identifying persons and/or objects in the surrounding environment of the mobile device, which may lead to the identification of the thief and/or recovery of the mobile device. | 05-28-2009 |
20090138328 | TARGETED DISTRIBUTION OF COMMERCIAL INCENTIVES - A system, method and computer program product is described that matches commercial incentives to consumers based on targeting data associated with the commercial incentive and user data associated with consumers in a manner that advantageously allows for highly-targeted delivery of commercial incentives to the consumers that are most likely to use them. Because both the targeting data and the user data may include spatial, temporal, social and topical data, matching may be performed based on any or all of these data types, as well as based on any combination of these data types. | 05-28-2009 |
20090138347 | DYNAMIC AUGMENTATION OF COMMERCIAL INCENTIVES - A commercial incentive engine and network is described that advantageously allows content and/or terms associated with a commercial incentive that has already been distributed to a consumer over a network to be dynamically augmented. The dynamic augmentation may occur responsive to one or more of revisions to the content and/or terms input by an advertiser, responsive to business information provided by an advertiser, or responsive to spatial, temporal, social and topical data associated with the consumer. An alternate implementation also advantageously allows the content and/or terms associated with a commercial incentive to be dynamically determined prior to distribution of the commercial incentive to a consumer over a network. | 05-28-2009 |
20090138348 | REDISTRIBUTION AND REDEMPTION OF COMMERCIAL INCENTIVES - Systems and methods are described for permitting commercial incentives received by a consumer device to be redistributed to other consumer devices, thereby facilitating the sharing and/or transport of commercial incentives between and among consumers. Systems and methods for distributing and/or redistributing commercial incentives from a node to consumer devices within a local network associated with the node are also described. In both distribution and redistribution scenarios, compensation may be issued to a distributor and/or redistributor upon redemption of a commercial incentive. | 05-28-2009 |
20090144211 | DYNAMIC REPRESENTATION OF GROUP ACTIVITY THROUGH REACTIVE PERSONAS - Embodiments are directed towards managing an adaptive media object to dynamically represent a persona reflecting a group's (or individual's) online and/or offline activities and behaviors. The group selects the adaptive media object to represent their persona digitally. The group may indicate which activities, actions, and/or behaviors are to be used to adapt the persona, and may further specify at least one mapping of a selected activity, action, and/or behavior to a change in the configuration of the adaptive media object. In one embodiment, the various activities, actions, and/or behaviors may be input to a machine learning algorithm that dynamically determines the changes to the adaptive media object. The adaptive media object may serve as a single point of contact for the group or individual for communications. The adaptive media object configuration may also change based upon the client device used to access the adaptive media object. | 06-04-2009 |
20090157496 | PERSONAL BROADCAST ENGINE AND NETWORK - A personal broadcasting system and method is described herein for automatically matching and introducing users based on their real-time locations, such that users identified as capable of or likely to form a relationship can be notified of that fact at a point in time when it is easy to meet. A system and method is also described herein that allows at least one of two users that have visited or passed through the same location at different points in time to automatically receive information about the other despite the temporal separation between them. | 06-18-2009 |
20090176509 | INTEREST MAPPING SYSTEM - Apparatus, interfaces, and computer instructions are provided for establishing an association between a user and a declared interest, such as a brand or some other subject, and for generating a map to display the interests of one or more users. An association is established between an interest identifier, a user, and target object selected based upon an action of the user. The target object may include a location that may be specified by coordinates. The action may include selection of the at least one location by the user. Selection may include selecting a user interface feature that causes the at least one location to be selected based upon a geographical position of the user. The position may be determined by a Global Positioning System device carried by the user. Techniques are also disclosed for identifying people who are potentially interested in a given interest, or in a second interest related to a first interest, based on previously established interest-location-user associations. | 07-09-2009 |
20090201850 | LOCATION TRACKING BASED ON PROXIMITY-BASED AD HOC NETWORK - A system and method is described for constructing a proximity-based ad hoc network among a plurality of sensors and for using such a network to perform location tracking. The system and method uses time-coded data received from each of the sensors to determine a current proximity of each of the sensors to one or more beacons. Then, by leveraging information relating to the effective transmission ranges of the beacons, the system and method determines the relative location of each of the plurality of sensors with respect to other sensors within the plurality of sensors. Where actual (as opposed to relative) location information is available for a particular sensor, it can be used to generate or augment location information associated with other sensors known to be spatially and temporally proximate to the particular sensor. The current location information for each of the sensors is then used in providing location-based services. | 08-13-2009 |
20090201896 | DATA SHARING BASED ON PROXIMITY-BASED AD HOC NETWORK - A system and method is described for constructing a proximity-based ad hoc network among a plurality of sensor-enabled devices and for using such a network to facilitate data sharing among users of those devices (referred to herein for simplicity as “sensors”). The system and method advantageously enables data to be shared among co-located sensors in a manner that does not require local connections or communication among those sensors and that protects user privacy. The system and method also beneficially enables data to be transferred among heterogeneous sensor types that would otherwise be incapable of detecting and/or communicating with each other. The system and method may perform user-initiated data transfer as well as automatic data transfer responsive to sensor proximity and other factors, such as commonality of user interests or activities or membership in a social network. | 08-13-2009 |
20090204348 | POWER MANAGEMENT FOR PROXIMITY-BASED AD HOC NETWORKS - A system and method is described herein for managing power consumption by a plurality of sensors in a proximity-based ad hoc network. The system and method receives sensor data that is provided from a plurality of sensors and constructs a proximity-based ad hoc network among the plurality of sensors based on the sensor data. The system and method also receives and analyzes power status information from each sensor in a group of spatially and temporally proximate sensors in the proximity-based ad hoc network. Based on the analysis, the system and method then modifies a manner in which at least one sensor in the group provides sensor data. | 08-13-2009 |
20090204354 | TIME CODE VALIDATION AND CORRECTION FOR PROXIMITY-BASED AD HOC NETWORKS - A system and method is described herein for managing power consumption by a plurality of sensors in a proximity-based ad hoc network. The system and method receives sensor data that is provided from a plurality of sensors and constructs a proximity-based ad hoc network among the plurality of sensors based on the sensor data. The system and method also receives and analyzes power status information from each sensor in a group of spatially and temporally proximate sensors in the proximity-based ad hoc network. Based on the analysis, the system and method then modifies a manner in which at least one sensor in the group provides sensor data. | 08-13-2009 |
20090276453 | MODIFICATION OF BRAND REPRESENTATIONS BY A BRAND ENGINE IN A SOCIAL NETWORK - A brand engine receives a request from a user device operated by a first user to display user information of a second user. User information of the first user is mapped to at least the user information of the second user by the brand engine. The mapping may map the user information of the first user to user information of further users in a social network. The mapping may map of any combination of spatial, temporal, social, and topical data related to the users. A modified representation of a brand profile of the second user is generated by the brand engine based on the mapping. The modified representation is transmitted to the user device. The user device displays the modified representation for the first user. The modified representation of the brand profile may include any combination of filtered and/or sorted brand objects, recommended brand objects, and/or modified brand objects. | 11-05-2009 |
20090276459 | MODIFICATION OF CONTENT REPRESENTATION BY A BRAND ENGINE IN A SOCIAL NETWORK - A brand engine receives a request from a user device operated by a first user to display user information of a second user. User information of the first user is mapped to at least the user information of the second user by the brand engine. The mapping may map the user information of the first user to user information of further users in a social network. The mapping may map of any combination of spatial, temporal, social, and topical data related to the users. A modified representation of received content is generated by the brand engine based on the mapping. The modified representation is transmitted to the user device. The user device displays the modified representation for the first user. The modified representation of the received content may include any combination of filtered and/or sorted content items, recommended content items, and/or modified content items. | 11-05-2009 |
20100027426 | BANDWIDTH AND COST MANAGEMENT FOR AD HOC NETWORKS - A system and method is described herein for managing bandwidth and cost in connection with a plurality of sensors in an ad hoc network. The system and method receives sensor data that is provided from a plurality of sensors and constructs an ad hoc network among the plurality of sensors based on the sensor data. The system and method also receives and analyzes bandwidth information from each sensor in a group of sensors in the ad hoc network. Based on the analysis, the system and method then modifies a manner in which at least one sensor in the group exchanges data, including sensor data and multimedia content. | 02-04-2010 |
20100030870 | REGION AND DURATION UNIFORM RESOURCE IDENTIFIERS (URI) FOR MEDIA OBJECTS - A method for providing a portion of a media object to a user is provided. The method includes receiving a URI associated with a media object. The URI indicates a portion of the media object. The method further includes determining the portion of the media object indicated by the URI. The method also includes providing the portion of the media object to a user. Furthermore, a system for providing a portion of a media object to a user is provided. The system includes a memory, logic for receiving a URI associated with a media object, and a processor. The processor is for determining the portion of the media object indicated by the URI, and providing the portion of the media object to a user. | 02-04-2010 |
20100076777 | AUTOMATIC RECOMMENDATION OF LOCATION TRACKING PRIVACY POLICIES - A system and method is described herein that automatically provides users with recommendations regarding location tracking privacy policies that may be appropriate to enact in certain contexts as well as a means for enacting such policies. Once a privacy policy is enacted, the manner in which location information associated with the user is provided to at least one application or service will be controlled in accordance with the privacy policy. The recommended privacy policies may represent privacy policies that have been enacted by other users in like contexts. | 03-25-2010 |
20100077484 | LOCATION TRACKING PERMISSIONS AND PRIVACY - A location tracking privacy engine is described herein that is configured to allow users to define privacy policies that govern how location information about each user is provided to context-aware applications and services. Privacy policies can be defined in a highly flexible and context-specific manner such that the execution of a given privacy policy by the location tracking privacy engine is dependent on the existence of one or more social, topical, temporal or spatial conditions. Privacy policies are then executed automatically by the location tracking privacy engine when the conditions associated with the policies are determined to be satisfied. | 03-25-2010 |
20100177938 | MEDIA OBJECT METADATA ENGINE CONFIGURED TO DETERMINE RELATIONSHIPS BETWEEN PERSONS - A media object, such as an image file, a video file, or an audio file, is analyzed to determine relationships between persons associated with the media object, which may include persons captured in the media object and/or a person that captured the media object. A representation of a first person captured in a media object is detected. The media object is analyzed to determine at least one indicator of a relation between the first person and a second person associated with the media object. A relationship between the first person and the second person is predicted based at least on the determined at least one relation indicator. The media object may be monetized in various ways, such as by directing advertisements to persons associated with the media object, and/or to persons having social connections to the persons associated with the media object. | 07-15-2010 |
20100179756 | OPTIMIZATION OF MAP VIEWS BASED ON REAL-TIME DATA - Routing information (e.g., routing information displayed in an electronic map or provided as verbal travel directions) is generated and presented to a user in a tailored manner. A request for routing information is received from a user. Spatial data, temporal data, social data, or topical data is retrieved that is related to the user and/or to a location or change of location of the user. Based on the retrieved data and the routing information, information display data is generated, and is provided to an electronic device of the user to generate an information display. An attribute of the information display is configured/modified based on the location information and/or on the spatial data, temporal data, social data, and/or topical data. For example, a display attribute and/or an audio attribute of the information display may be modified. | 07-15-2010 |
20100179856 | CONDITIONAL INCENTIVE PRESENTATION, TRACKING AND REDEMPTION - An offer is presented to a user via a user device, wherein the terms of the offer include at least one activity to be performed by the user or at least one behavior to be observed by the user and at least one incentive to be rewarded to the user responsive to the performance of the at least one activity or the observance of the at least one behavior. A determination is made as to whether the user has performed the at least one activity or observed the at least one behavior based on at least spatial, temporal, social and/or topical data obtained from a network-based tracking engine. Responsive to a determination that the user has performed the at least one activity or observed the at least one behavior, the user is provided with the at least one incentive. | 07-15-2010 |
20100179874 | MEDIA OBJECT METADATA ENGINE CONFIGURED TO DETERMINE RELATIONSHIPS BETWEEN PERSONS AND BRANDS - A media object, such as an image file, a video file, or an audio file, is analyzed to determine relationships between brands having representations captured in the media object, and persons associated with the media object (e.g., persons captured in the media object and/or a person that captured the media object). A representation of a brand captured in a media object is detected. The media object is analyzed to determine at least one indicator of a relation between the brand and a person associated with the media object. A relationship between the brand and person is predicted based at least on the determined at least one relation indicator. The media object may be monetized in various ways, such as by directing advertisements (e.g., advertisements related to the detected brand) to persons associated with the media object, and/or to persons having social connections to the persons associated with the media object. | 07-15-2010 |
20100241689 | METHOD AND APPARATUS FOR ASSOCIATING ADVERTISING WITH COMPUTER ENABLED MAPS - An interactive system and method based on the Internet and intended for advertising distribution uses collectively authored (user generated) content and maps that are interactive. The maps are personalized with the user generated content and with targeted advertising units and transmitted to a user. This provides an interactive user experience in terms of both the advertising and content generated by other users relating to an advertiser offer, but having the personalized aspect, making it more effective as advertising. | 09-23-2010 |
20100241944 | METHOD AND APPARATUS FOR ASSOCIATING ADVERTISING CONTENT WITH COMPUTER ENABLED MAPS - A computer based system and method for mobile and online Internet type advertising that includes advertisements in “tag maps”, which are interactive maps with associated text strings. The system allows advertisers to buy, lease or bid in real time for advertising opportunities associated with particular tags (text strings) within such tag maps. This is in the context of Internet web pages. This further allows advertisers to modify the display or content of the associated tag maps and/or advertising units. | 09-23-2010 |
20100280879 | GIFT INCENTIVE ENGINE - A system and method to facilitate efficient gift giving is disclosed herein. Gift giver, gift recipient, advertisers/sponsors, and third party service providers participate in providing input at the gift evaluation, selection, purchase, delivery, and consumption stages to increase the likelihood of the gift recipient's satisfaction and consumption of the gift. The interactive environment facilitates opaque gathering of information from the relevant parties relative to each other. | 11-04-2010 |
20100280913 | GIFT CREDIT MATCHING ENGINE - A system and method to facilitate exchange of unwanted gifts is disclosed herein. A user may submit an unwanted gift in exchange for another gift item or a gift credit. Potential exchange gifts from among other unwanted gifts matching certain criteria are identified and presented to the user for selection. If the user does not find the potential exchange gifts to his liking, a gift credit having a value comparable to his/her submitted unwanted gift is issued to his account. As other users submit their unwanted gifts and/or as the value of the user's gift credit changes over time, the user may receive notification of new potential exchange gifts to choose from. | 11-04-2010 |
20100306276 | DYNAMIC GROUP LABELS - Disclosed are methods and apparatus for managing dynamic groups. In one embodiment, a method of creating or modifying a group of users is disclosed. A request is received from a first user to create or modify a current group. One or more rules are also received from the first user for specifying members of the current group based on user information that was or will be collected for a plurality of users. In one embodiment, the collected user information includes at least user presence information or user communication data. A membership policy for the current group is then retained based on the received one or more rules. The membership policy for the current group is accessibly usable so as to dynamically allow a selected set of users, who each have corresponding collected user information which meets the membership policy, to become members of the current group, wherein the selected set of users is changeable over time as different user information is collected over time. | 12-02-2010 |
20100325686 | DYNAMIC ACCESS CONTROL LISTS - Disclosed are methods and apparatus for creating and managing dynamic access control lists (ACL's). In a specific embodiment, a method of creating or modifying a dynamic access control policy (ACP) is disclosed. A current ACP for one or more specified resources is defined based on one or more membership rules for specifying users who can access the one or more specified resources based on user information that was or will be collected for a plurality of users. The collected user information includes at least user presence information or user communication data. The current ACP is retained for the one or more specified resources, wherein the current ACP is accessibly usable so as to dynamically allow a selected set of users, who each have corresponding collected user information which meets the one or more membership rules of the current ACP, to access the one or more specified resources. The selected set of users is changeable over time as different user information is collected over time. | 12-23-2010 |
20110313829 | DYNAMIC AUGMENTATION OF ELECTRONIC COUPONS - A commercial incentive engine and network is described that advantageously allows content and/or terms associated with a commercial incentive that has already been distributed to a consumer over a network to be dynamically augmented. The dynamic augmentation may occur responsive to one or more of revisions to the content and/or terms input by an advertiser, responsive to business information provided by an advertiser, or responsive to spatial, temporal, social and topical data associated with the consumer. An alternate implementation also advantageously allows the content and/or terms associated with a commercial incentive to be dynamically determined prior to distribution of the commercial incentive to a consumer over a network. | 12-22-2011 |
20110313841 | TARGETED DISTRIBUTION OF ELECTRONIC COUPONS - A system, method and computer program product is described that matches commercial incentives to consumers based on targeting data associated with the commercial incentive and user data associated with consumers in a manner that advantageously allows for highly-targeted delivery of commercial incentives to the consumers that are most likely to use them. Because both the targeting data and the user data may include spatial, temporal, social and topical data, matching may be performed based on any or all of these data types, as well as based on any combination of these data types. | 12-22-2011 |
20120016729 | TARGETED DISTRIBUTION OF ELECTRONIC COUPONS - A system, method and computer program product is described that matches commercial incentives to consumers based on targeting data associated with the commercial incentive and user data associated with consumers in a manner that advantageously allows for highly-targeted delivery of commercial incentives to the consumers that are most likely to use them. Because both the targeting data and the user data may include spatial, temporal, social and topical data, matching may be performed based on any or all of these data types, as well as based on any combination of these data types. | 01-19-2012 |
20120239487 | TARGETED DISTRIBUTION OF ELECTRONIC COUPONS - A system, method and computer program product is described that matches commercial incentives to consumers based on targeting data associated with the commercial incentive and user data associated with consumers in a manner that advantageously allows for highly-targeted delivery of commercial incentives to the consumers that are most likely to use them. Because both the targeting data and the user data may include spatial, temporal, social and topical data, matching may be performed based on any or all of these data types, as well as based on any combination of these data types. | 09-20-2012 |
20130058470 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130059572 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130060619 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060620 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060624 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060625 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060665 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060695 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060759 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060848 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130060850 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060851 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060852 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060866 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060867 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060868 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130060869 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130061050 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130061332 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130061333 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130085843 | GESTURE BASED NAVIGATION TO AUXILIARY CONTENT - Methods, systems, and techniques for providing automatic navigation to auxiliary content. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables users to use a gesture-based user interface and dynamically define any content as a “link” for navigating to other content. In overview, the DGGS allows a user to use a gesture-based user interface to indicate some portion of content that is being presented on a presentation device associated with the user. This indicated portion is then used as a dynamic “link” (without necessitating a link being embedded in the underlying content) by the DGGS to navigate to other content or for other purposes. This dynamic cross-reference to other content is termed a “gesturelet.” The DGGS determines, based upon this gesturelet what content to present next to the user and then presents it accordingly. | 04-04-2013 |
20130085847 | PERSISTENT GESTURELETS - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables one to dynamically define a gesturelet for navigating to or presenting other content, or for performing some behavior. In overview, the DGGS allows a portion of electronically presented content to be dynamically indicated by a gesture. The indicated portion can then be formed into a gesturelet and used by the DGGS to navigate to other content, perform a set of instructions, present auxiliary content, or for other purposes. Gesturelets may be stored persistently and associated with some auxiliary content, such as a set of behaviors, advertisements, competitions, supplemental material or images, or the like. Later, when an action in the system occurs such that the persistent representation is retrieved, the behavior associated with the persistent representation is performed and the associated auxiliary content presented. | 04-04-2013 |
20130085848 | GESTURE BASED SEARCH SYSTEM - Methods, systems, and techniques for automatically initiating a search to present auxiliary content in a gesture based input system are provided Example embodiments provide a Gesture Based Search System (GBSS), which enables a gesture-based user interface to invoke (e.g., execute, generate, initiate, perform, or cause to be executed, generated, initiated, performed, or the like) a search related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBSS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBSS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine input to a search. The search is then automatically initiated with the determined source input. Once search result content is determined, the result content is then presented to the user. | 04-04-2013 |
20130085849 | PRESENTING OPPORTUNITIES FOR COMMERCIALIZATION IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for automatically presenting commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine an opportunity for commercialization to present. An opportunity for commercialization may come in many forms, including, for example, a web page, code, document, or the like. Once the opportunity for commercialization is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130085855 | GESTURE BASED NAVIGATION SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Navigation System (GBNS), which enables a gesture-based user interface to navigate to auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBNS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBNS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to navigate to. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130086056 | GESTURE BASED CONTEXT MENUS - Methods, systems, and techniques for providing context menus based upon gestured input are provided. Example embodiments provide a Gesture Based Context Menu System, which enables a gesture-based user interface to invoke a context menu to present one or more choices of next actions and/or entities based upon the context indicated by the gestured input and a set of criteria. In overview, the GBCMS allows an area of electronically presented content to be dynamically indicated by a gesture and then examines the indicated area in conjunction with a set of criteria to determine and present a context menu of further choices available to the user. The choices may be presented in the form of, for example, a pop-up menu, a pull-down menu, an interest wheel, or a rectangular or non-rectangular menu. In some embodiments the menus dynamically change as the gesture is modified. | 04-04-2013 |
20130086499 | PRESENTING AUXILIARY CONTENT IN A GESTURE-BASED SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to present. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130097669 | Behavioral fingerprint controlled theft detection and recovery - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130097683 | Trust verification schema based transaction authorization - A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130104203 | BEHAVIORAL FINGERPRINT BASED AUTHENTICATION - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. In addition to the foregoing, other example aspects are described in the claims, drawings, and written description forming a part of the present disclosure. | 04-25-2013 |
20130106682 | Context-sensitive query enrichment | 05-02-2013 |
20130106683 | Context-sensitive query enrichment | 05-02-2013 |
20130106685 | Context-sensitive query enrichment | 05-02-2013 |
20130106695 | Context-sensitive query enrichment | 05-02-2013 |
20130106892 | Context-sensitive query enrichment | 05-02-2013 |
20130106893 | Context-sensitive query enrichment | 05-02-2013 |
20130106894 | Context-sensitive query enrichment | 05-02-2013 |
20130110804 | Context-sensitive query enrichment | 05-02-2013 |
20130117105 | ANALYZING AND DISTRIBUTING BROWSING FUTURES IN A GESTURE BASED USER INTERFACE - Methods, systems, and techniques for presenting auxiliary content and information regarding browsing and/or navigation futures to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer to one or more sponsors of content information regarding a next content to be examined by a user related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with potentially a set of (e.g., one or more) factors to determine a next content and distributes information to potential sponsors. Once auxiliary content is received or determined, it is then presented to the user when the next content is navigated to. | 05-09-2013 |
20130117111 | COMMERCIALIZATION OPPORTUNITIES FOR INFORMATIONAL SEARCHING IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting sponsor supplied content associated with commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to determine and present sponsor supplied content associated with an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with possibly a set of (e.g., one or more) factors to determine which sponsor supplied content associated with an opportunity for commercialization to present. Once the sponsor supplied content associated with an opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated topic, object, and/or action. | 05-09-2013 |
20130117130 | OFFERING OF OCCASIONS FOR COMMERCIAL OPPORTUNITIES IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting commercial opportunities to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer occasions for an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture to one or more sponsors of content. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine which opportunity for commercialization to present which is dynamically or has been previously associated with the content indicated by the gesture. Once the opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated product and/or service. | 05-09-2013 |
20130117214 | Behavioral Fingerprinting Via Derived Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-09-2013 |
20130133033 | Behavioral fingerprint controlled automatic task determination - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function of the determined behavioral fingerprint and a direction received from the network-accessible user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133052 | Behavioral fingerprint device identification - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network-accessible user; and identifying a current device of the one or more devices as being currently used by the network-accessible user as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133054 | Relationship Based Trust Verification Schema - A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 05-23-2013 |
20130135332 | Context-sensitive query enrichment - Structures and protocols are presented for facilitating a search partly based on a movement status of a search-capable device or on a position of a person's limb or on an association with another search-capable device. | 05-30-2013 |
20130151515 | Behavioral Fingerprinting Via Social Networking Interaction - Disclosed herein are example embodiments for behavioral fingerprinting via social networking interaction. For certain example embodiments, at least one indication of family relation for at least one authorized user may be obtained via at least one social networking interaction, and the at least one indication of family relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 06-13-2013 |
20130151617 | BEHAVIORAL FINGERPRINTING VIA SOCIAL NETWORK VERIFICATION - Disclosed herein are example embodiments for behavioral fingerprinting via social network verification. For certain example embodiments, one or more devices may (i) detect at least one attempt to perform at least one task via at least one user device; and (ii) initiate transmission of at least one verification inquiry to one or more social network connections based at least partly on the at least one attempt to perform the at least one task via the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-13-2013 |
20130159217 | ENVIRONMENTALLY-RESPONSIVE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for environmentally-responsive behavioral fingerprinting. For certain example embodiments, one or more devices may: (i) obtain at least one environmental parameter relating to an event to potentially occur in conjunction with at least one user device; or (ii) perform at least one analysis for the event based at least partially on the at least one environmental parameter and at least partially on at least one utilization indicator of a behavioral fingerprint that is associated with the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130159413 | BEHAVIORAL FINGERPRINTING WITH SOCIAL NETWORKING - Disclosed herein are example embodiments for behavioral fingerprinting with social networking. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130160087 | BEHAVIORAL FINGERPRINTING WITH ADAPTIVE DEVELOPMENT - Disclosed herein are example embodiments for behavioral fingerprinting with adaptive development. For certain example embodiments, one or more devices may: (i) determine at least one indication of utilization for at least one authorized user via at least one user-device interaction; and (ii) incorporate at least one indication of utilization into at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130167207 | Network Acquired Behavioral Fingerprint for Authentication - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of the computing device, the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device. In addition to the foregoing, other example aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 06-27-2013 |
20130191887 | Social network based trust verification Schema - A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-25-2013 |
20130197968 | BEHAVIORAL FINGERPRINTING WITH RETAIL MONITORING - Disclosed herein are example embodiments for behavioral fingerprinting with retail monitoring. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 08-01-2013 |
20130268756 | COMPUTATIONAL SYSTEMS AND METHODS FOR ANONYMIZED STORAGE OF DOUBLE-ENCRYPTED DATA - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. | 10-10-2013 |
20130268773 | COMPUTATIONAL SYSTEMS AND METHODS FOR PREPARING DATA FOR DOUBLE-ENCRYPTION AND ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity. | 10-10-2013 |
20130287204 | COMPUTATIONAL SYSTEMS AND METHODS FOR DOUBLE-ENCRYPTING DATA FOR SUBSEQUENT ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-one encrypted data including at least one associated encrypted identifier; encrypting with a level-two encryption key at least a part of the level-one encrypted data to produce level-two encrypted data; receiving a hash of the at least one associated encrypted identifier; associating the hash with the level-two encrypted data; and transmitting the level-two encrypted data and associated hash of the at least one associated encrypted identifier. | 10-31-2013 |
20130290700 | COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier. | 10-31-2013 |
20140040989 | MULTI-DEVICE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint. | 02-06-2014 |
20140123249 | Behavioral Fingerprinting Via Corroborative User Device - Disclosed herein are example embodiments for behavioral fingerprinting via corroborative user device. For certain example embodiments, one or more devices may (i) ascertain at least one indicator of a proximity of at least one corroborative user device that is affiliated with a behavioral fingerprint and (ii) incorporate the at least one indicator of a proximity of the at least one corroborative user device into an authentication-related analysis for a user device that is associated with the behavioral fingerprint. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 05-01-2014 |
20140123253 | Behavioral Fingerprinting Via Inferred Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-01-2014 |
20140287782 | TIME CODE VALIDATION AND CORRECTION FOR PROXIMITY-BASED AD HOC NETWORKS - A system and method is described herein for managing power consumption by a plurality of sensors in a proximity-based ad hoc network. The system and method receives sensor data that is provided from a plurality of sensors and constructs a proximity-based ad hoc network among the plurality of sensors based on the sensor data. The system and method also receives and analyzes power status information from each sensor in a group of spatially and temporally proximate sensors in the proximity-based ad hoc network. Based on the analysis, the system and method then modifies a manner in which at least one sensor in the group provides sensor data. | 09-25-2014 |