Patent application number | Description | Published |
20080312924 | SYSTEM AND METHOD FOR TRACKING PERSONS OF INTEREST VIA VOICEPRINT - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 12-18-2008 |
20090092239 | SYSTEM AND METHOD FOR CONNECTING TO ADDRESSES RECEIVED IN SPOKEN COMMUNICATIONS - Disclosed herein are systems, methods, and computer-readable media to connecting to addresses received in spoken communications. The method for connecting to addresses received in spoken communications comprises receiving at least one spoken communication containing a spoken address, extracting each address automatically from the at least one spoken communication, displaying to a user at least one extracted address, and receiving from the user a selection of at least one extracted address to initiate communication. | 04-09-2009 |
20090150437 | System and method for tracking an individual using typeprinting - Disclosed is a system and method for tracking an individual of interest over a network. Keystroke dynamics of users using computers are obtained in order to identify the individual of interest when the individual of interest uses one of the computers. Usage data of the individual of interest is recorded when the individual of interest is identified as using one of the computers. | 06-11-2009 |
20090248435 | Method for locating just in time mobile services - The current invention is based, at least in part, on the recognition that there is a problem of missed commercial opportunities when a commercial vendor is a mobile provider of goods or services. A need exists for facilitating communication between a mobile provider of goods or services and a potential recipient of those goods or services. Ideally, a solution to this need would not require a human dispatcher as an intermediary, due to various inefficiencies associated with such a method. In accordance with an aspect of the current invention, the limitation of missed business opportunities is avoided by (1) activating, by a mobile provider of commercial goods or services, a notification regarding availability to provide said commercial goods or services within a given distance of said mobile provider; and, (2) receiving, in response to said notification, and at a mobile location of said mobile provider of commercial goods or services, a request from a requester who is within the given distance of said mobile provider to provide said commercial goods or services to said requester. This method maximizes commercial opportunities between two parties without the need for a human dispatcher as an intermediary. | 10-01-2009 |
20100070902 | Method and System for Controlling Physical Components Via A Virtual Environment - A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction. | 03-18-2010 |
20100128918 | Method and System for Content Distribution Network Performance and Quality Measurement - A content delivery system includes an upload module, a content delivery module, and a quality assurance module. The upload module is configured to receive content from a content provider, and generate an upload signature for the content as received from the content provider. The content delivery module is configured to receive a request for the content from a client system, and provide the content to the client system. The quality assurance module is configured to generate a download signature for the content as delivered to the client, and compare the upload signature and the download signature. When the upload signature and the download signature do not match, the quality assurance module is further configured to generate an alert. | 05-27-2010 |
20100146395 | Method and System for Exploiting Interactions Via A Virtual Environment - A method on a computer readable storage medium operable to store a virtual representation of a plurality of physical components, introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. A system having a memory configured to store a virtual representation of a plurality of physical components and a processor configured to introduce a component having a predefined functionality to interact with the virtual representation and generate indications of a response of the virtual representation to the interactions of the component. | 06-10-2010 |
20100153325 | E-Mail Handling System and Method - A message processing system and method that recommends actions for incoming messages based upon past historical email behavior information. The historical email behavior information represents a user's behavior for a plurality of past messages and an action is recommended based on a comparison of the incoming messages to the historical email behavior information. | 06-17-2010 |
20100153566 | MONITORING REQUESTED CONTENT - Requested content is monitored and metadata for the content is accessed and reported to an administrator communication device. The reported metadata may be indicative of a classification of the requested content, an address of the requested content, a title of the requested content, or portions (e.g., video images) of the requested content. Administrators are enabled to receive dynamic updates regarding requested and received content in real time and may block viewer requested content or send messages to the viewer that are related to the content. | 06-17-2010 |
20100161636 | Messaging Personalization - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that are to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 06-24-2010 |
20110055862 | System and Method to Determine an Authorization of a Wireless Set-Top Box Device to Receive Media Content - A computer-implemented method includes determining, at a set-top box device, positioning data associated with a location of the set-top box device. The computer-implemented method includes determining whether the set-top box device is authorized to receive media content at the location. The computer-implemented method also includes receiving the media content via a wireless transmission from a residential gateway when the set-top box device is authorized to receive the media content at the location. | 03-03-2011 |
20110072071 | METHOD AND APPARATUS FOR LOCATION-BASED, JUST IN TIME SOCIAL NETWORKING - In one embodiment, the present disclosure is a method and apparatus for location-based, just in time social networking. In one embodiment, a method for providing a social network includes receiving a request from a first user of the social network to provide information from a location of interest specified by the first user, and locating a group comprising at least one other user of the social network, where each of the at least one other user is currently at the location of interest and has volunteered to provide information from the location of interest, wherein the group is selected from a larger group of other users who are at a plurality of locations of interest. | 03-24-2011 |
20110078252 | METHOD AND APPARATUS FOR CREATING A SOCIAL NETWORK MAP OF NON-VOICE COMMUNICATIONS - A method, apparatus and computer readable medium for creating a social network map using non-voice communications are disclosed. For example, the method registers employment data of an employee, monitors non-voice communications of the employee, generates a social network map of the non-voice communications of the employee and analyzes the social network map to provide at least one correlation. | 03-31-2011 |
20110078716 | Providing a Dedicated Channel Accessible to a Group of Users - A system includes a service provider network configured to communicate with a plurality of television-based user devices. The system also includes a database storing a status of user activity with respect to each of the plurality of television-based user devices and storing indicators of user-defined relationships between respective users of the plurality of television-based user devices. The system further includes a dedicated channel accessible to a group of users of the plurality of television-based user devices. The dedicated channel is arranged to enable interactive activity between members of the group. | 03-31-2011 |
20110083185 | Method and System for Improving Website Security - A method for locating and monitoring websites is provided that includes finding websites and contained hyperlinks, downloading a first snapshot of a web page taken at a first time, and downloading a second snapshot of the web page taken at a second time later than the first time. The method also includes enabling a comparison of the first snapshot and the second snapshot. A system for monitoring websites is provided. The system includes means for enabling a comparison of the first snapshot and the second snapshot visually or through the use of content data from that web site. A computer-readable recording medium having recorded thereon an executable program is provided. The program when executed causes a processor to perform a method for monitoring websites. | 04-07-2011 |
20110088073 | USER-CONFIGURED BACKGROUND CHANNELS IN INTERNET-PROTOCOL TELEVISION - A method and system for implementing background channels includes storing configuration information for a user of a multimedia content distribution network (MCDN). The MCDN user may receive and view a selected channel at an MCDN client. When an exception condition occurs, an indication of a background channel may be displayed to the MCDN user. The configuration information may include user content preferences for matching to metadata in multimedia content to generate the exception condition, as well as an identifier for a desired background channel. | 04-14-2011 |
20110093902 | System and Method to Process a Data Stream Having Different Content Types - A computer-implemented method includes receiving a data stream at a set-top box device from a residential gateway. The data stream includes first data having a first content type, second data having a second content type, and third data having a third content type. The method includes assigning the first data for processing at a first machine of the set-top box device. The method also includes assigning the second data for processing at a second machine of the set-top box device. The method further includes assigning the third data for processing at a third machine of the set-top box device. The set-top box device is configured to selectively output at least one of the first data, the second data, and the third data for display at a display device. | 04-21-2011 |
20110107386 | System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data - Methods and systems for problem detection related to received Internet data, video data, and voice data are disclosed. A method may include monitoring, at a set top box device, Internet data to detect a first problem related to the Internet data. The method may further include monitoring, at the set top box device, video data to detect a second problem related to the video data. The method may include automatically taking a first action upon detecting the first problem and automatically taking a second action upon detecting the second problem. | 05-05-2011 |
20110131280 | Method and Apparatus for Managing an Electronic Messaging System - A rating is received, from a first user of an electronic messaging system, pertaining to a use by a second user of a reply-to-all function provided by the electronic messaging system. An etiquette value associated with the second user is updated based on the rating. An access by the second user to the reply-to-all function is controlled based on the updated etiquette value associated with the second user. The electronic messaging system may comprise an email messaging system, for example. Systems and apparatus are also described. | 06-02-2011 |
20110138467 | Method and System for Content Distribution Network Security - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 06-09-2011 |
20110145833 | Multiple Mode Mobile Device - In one or more embodiments, one or more methods and/or systems described can perform displaying, on a handheld device, multiple icons associated with multiple segments; receiving first user input indicating a first segment of the multiple segments; executing a first virtual machine associated with the first segment on the handheld device; executing a first application on the first virtual machine; receiving second user input indicating a second segment of the multiple segments; executing a second virtual machine associated with the second segment on the handheld device; and executing a second application on the second virtual machine. In one or more embodiments, one or more methods and/or systems described can further perform before executing the second virtual machine, receiving authentication information and determining that the user is authenticated. In one or more embodiments, the authentication information can include at least one of a user name, a password, and/or biometric information. | 06-16-2011 |
20110145887 | System and Method of Selectively Applying Security Measures to Data Services - Systems and methods of applying security measures to data services are disclosed. In one embodiment, a processor determines when more than one data service is used by or is accessible to a subscriber device and applies a security measure to at least one data service. | 06-16-2011 |
20110151897 | METHOD AND APPARATUS FOR PROVIDING MOBILE MESSAGING ENABLED EVENT PLANNING, SCHEDULING AND TRACKING SERVICE - A method and computer readable medium for providing a mobile messaging event planning service in a communications network are disclosed. For example, the method assigns a mobile messaging identification code for an event, receives a text message including the mobile messaging identification code for the event and provides information associated with the event in response to the text message. | 06-23-2011 |
20110196941 | Method and System for Content Distribution Network Performance and Quality Measurement - A method for delivering content includes receiving the content at an edge server from a content provider, generating an upload signature for the content as received from the content provider where the upload signature includes a hash of the content, receiving a request for the content from a client system, providing the content to the client system, generating a download signature and a screen capture image for the content as provided to the client system, comparing the upload signature and the download signature, and generating an alert when the upload signature and the download signature do not match. | 08-11-2011 |
20110252338 | INNOVATION PIPELINE - Unique content generated by a group of individual users is evaluated. First unique content provided by a first user via a social networking website interface is collected at a tangible host server. Second unique content provided by a second user via the social networking website interface is collected at the tangible host server. User input ratings from individual users of the social networking website interface are collected so as to rate the first unique content and second unique content. In a first evaluation stage, the first unique content and second unique content are evaluated based on user input from individual users of the social networking website interface so as to comparatively rank the first unique content and second unique content. | 10-13-2011 |
20110289134 | End-To-End Secure Cloud Computing - A method includes receiving, at a control node of a cloud computing network, a first enterprise policy specific to the first enterprise and a second enterprise policy specific to the second enterprise, and managing communications between at least one user device of the first enterprise and the at least one enterprise application hosted on behalf of the first enterprise based on the first enterprise policy. The method also includes managing communications between at least one user device of the second enterprise and the at least one enterprise application hosted on behalf of the second enterprise based on the second enterprise policy. | 11-24-2011 |
20120072218 | SYSTEM AND METHOD FOR TRACKING PERSONS OF INTEREST VIA VOICEPRINT - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 03-22-2012 |
20120222070 | System and Method of Problem Detection in Received Internet Data, Video Data, and Voice Data - A method for problem detection related to received data includes monitoring data to detect a first problem and a second problem related to the data. The first problem may be related to a first data type and the second problem may be related to a second data type. The first data type and the second data type may be distinct from each other. The method includes determining a first remedial action in response to detecting the first problem and a second remedial action in response to detecting the second problem. The method includes determining a priority order for the first remedial action and the second remedial action. | 08-30-2012 |
20120317221 | MESSAGING PERSONALIZATION - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that is to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 12-13-2012 |
20120328090 | Methods, Systems, and Computer Program Products for Determining Targeted Content to Provide in Response to a Missed Communication - Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option. | 12-27-2012 |
20130138716 | APPARATUS AND METHOD FOR PROVIDING ACTIVITY MONITORING AND ANALYSIS - A system that incorporates teachings of the present disclosure may include, for example, detecting an occurrence of an activity by synthesizing sensory data collected at a mobile communication device according to one or more references corresponding to the activity, sharing tracking information associated with the detected occurrence of the activity over a communication network, and presenting feedback information corresponding to the tracking information. Other embodiments are disclosed. | 05-30-2013 |
20130177141 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 07-11-2013 |
20130179523 | METHOD AND APPARATUS FOR LOCATION-BASED, JUST IN TIME SOCIAL NETWORKING - In one embodiment, the present disclosure is a method and apparatus for location-based, just in time social networking. In one embodiment, a method for providing a social network includes receiving a request from a first user of the social network to provide information from a location of interest specified by the first user, and locating a group comprising at least one other user of the social network, where each of the at least one other user is currently at the location of interest and has volunteered to provide information from the location of interest, wherein the group is selected from a larger group of other users who are at a plurality of locations of interest. | 07-11-2013 |
20130198306 | Messaging Personalization - Participants in a communication are rendered by determining whether each entry in a list of participants in the communication satisfies criteria specified by a user participating in the communication. The criteria are used to identify a first subset of participants that is to be rendered in a first style that differentiates the first subset from remaining participants in the list. The first subset of participants is formatted in the first style. | 08-01-2013 |
20130205392 | METHOD AND SYSTEM FOR CONTENT DISTRIBUTION NETWORK SECURITY - A content delivery system includes an upload module, a content delivery module, and a monitoring module. The upload module is configured to receive content from a content provider, detect content containing malicious software or proprietary information, and provide information about the content to a monitoring module. The content delivery module is configured to detect content containing malicious software or unauthorized changes, detect operational changes to the content delivery module, provide information about the content and the operational changes to the monitoring module, receive a request for the content from a client system, and provide the content to the client system. The monitoring module is configured to monitor a network for potentially malicious traffic, receive information from the content delivery module and the upload module, correlate the information and the potentially malicious traffic to identify a security event, and trigger a response to the security event. | 08-08-2013 |
20130238517 | METHOD AND APPARATUS FOR CREATING A SOCIAL NETWORK MAP OF NON-VOICE COMMUNICATIONS - A method, apparatus and computer readable medium for creating a social network map using non-voice communications are disclosed. For example, the method registers employment data of an employee, monitors non-voice communications of the employee, generates a social network map of the non-voice communications of the employee and analyzes the social network map to provide at least one correlation. | 09-12-2013 |
20130290961 | Multiple Mode Mobile Device - A particular method includes receiving authentication information at a device. The method also includes determining, by the device, whether a user is authenticated based on the authentication information. The method further includes executing, by the device, a first virtual machine in response to determining that the user is authenticated. The first virtual machine has access to sensitive information. The method also includes executing, by the device, a first application on the first virtual machine. The method further includes determining, by the device, whether execution of an instruction associated with a second virtual machine would result in a fault. The method also includes, in response to determining that execution of the instruction would result in the fault, preventing execution of the instruction and allowing the second virtual machine to fail without adversely affecting the first virtual machine. | 10-31-2013 |
20130298213 | Systems and Methods for Using Voiceprints to Generate Passwords on Mobile Devices - Systems for verifying a user's voiceprint and generating a password for use at one or more application servers are disclosed. The systems can reside on a network or on a device. The application servers can be in communication with one or more devices or networks. Several methods for verifying the identity of the user using possession-based, knowledge-based, location-based, and biometric access control are disclosed. | 11-07-2013 |
20140012675 | Methods, Systems, and Computer Program Products for Determining Targeted Content to Provide in Response to a Missed Communication - Targeted content is provided to at least one communication device responsive to a notification of a missed communication. Responsive to a notification of the missed communication, a selection of one of a plurality of different pricing options is received for a return communication. Targeted content is provided, in addition to content of the return communication, based on the selected pricing option. | 01-09-2014 |
20140052277 | Method and system for controlling physical components via a virtual environment - A computer readable storage medium storing a set of instructions that are executable by a processor, the set of instructions being operable to store a virtual representation of a plurality of physical components, display the virtual representation, receive user interaction with at least one of the virtual representations and send a command to the physical component corresponding to the user interaction. | 02-20-2014 |
20140150031 | METHOD AND APPARATUS FOR ACCESSING MEDIA CONTENT - A method that incorporates teachings of the subject disclosure may include, for example establishing, by a system comprising a processor, communication with a mobile wireless network to access a home media processor subscriber account via the mobile wireless network, receiving, by the system, media content from the mobile wireless network based on home media processor information from the home media processor subscriber account, and transmitting, by the system, to a display device a video stream generated from the media content. Other embodiments are disclosed. | 05-29-2014 |
20150085999 | System and Method for Tracking Persons of Interest Via Voiceprint - Disclosed are systems, methods, and computer readable media for tracking a person of interest. The method embodiment comprises identifying a person of interest, capturing a voiceprint of the person of interest, comparing a received voiceprint of a caller with the voiceprint of the person of interest, and tracking the caller if the voiceprint of the caller is a substantial match to the voiceprint of the person of interest. | 03-26-2015 |
20150089007 | E-MAIL HANDLING BASED ON A BEHAVIORAL HISTORY - Recommending actions for incoming messages based upon past historical email behavior information is presented herein. The historical email behavior information represents a user's behavior for a plurality of past messages and an action is recommended based on a comparison of the incoming messages to the historical email behavior information. | 03-26-2015 |