Patent application number | Description | Published |
20100142005 | VISUAL CRYPTOGRAPHY AND VOTING TECHNOLOGY - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 06-10-2010 |
20100176949 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 07-15-2010 |
20100294587 | Tetrahedral Loudspeaker - In some embodiments, a subwoofer enclosure includes a substantially triangular first face, second face, third face, and fourth face, a first corner at an intersection of the first, second and third faces, a second corner at an intersection of the first, second and fourth faces, a third corner at an intersection of the first, third and fourth faces, a fourth corner at an intersection of the second, third and fourth faces, wherein an angle between the first corner and a midpoint between the third corner and the fourth corner, having the second corner as its vertex, is substantially ninety degrees, wherein an angle between the third corner and the fourth corner, having the second corner as its vertex, is substantially ninety degrees, and a subwoofer driver attached to the third face, having a free air resonant frequency less than one hundred Hertz. | 11-25-2010 |
20100332562 | Location-Based Services - In some embodiments, a technique for providing location-based functionality comprises providing functionality, wherein the functionality uses information provided by a location-aware device. | 12-30-2010 |
20110016020 | Pricing by historical comparison - In some embodiments, techniques for pricing may include detecting a visitor at an e-commerce site, determining that an item offered for sale at the e-commerce site is of potential interest to the visitor, detecting another e-commerce site at which the user has viewed the item, determining a historical price, wherein the historical price is associated with a web page, wherein the web page offered the item at the other e-commerce site, calculating an offering price, wherein the offering price is based on the historical price, offering the item to the visitor at the offering price, and selling the item to the visitor at the offering price. | 01-20-2011 |
20110028160 | METHOD AND SYSTEM FOR LOCATION-TRIGGERED REWARDS - In some embodiments, techniques for rewarding presence include detecting a presence of a mobile phone within an enclosed space, transmitting information relating to the presence of the mobile phone within the enclosed space to a server computer, wherein the server computer processes an award for the presence of the mobile phone within the enclosed space, wherein the award is associated with a user account associated with the mobile phone; and receiving from the server computer information relating to the award. | 02-03-2011 |
20110029359 | METHOD AND SYSTEM FOR DETECTING PRESENCE USING A WIFI NETWORK PROBE DETECTOR - The detection system monitors WiFi wireless communications at a wireless device and detects a probe request associated with a location. The WiFi device may be a dedicated presence detection device or may offer access to internet and other services as a WiFi access point. A device identifier associated with the originating device may be a component of the probe request. Using the device identifier, the system can detect the presence of a consumer at the location associated with the wireless communications device and transmit information to the consumer based upon the device identifier. | 02-03-2011 |
20110029362 | METHOD AND SYSTEM FOR ADAPTIVE OFFER DETERMINATION - The optimization system monitors a mobile phone user's behavior in response to an offer for a reward and determines a good level for a product promotion. The determination may be made based upon the user's current response, past response patterns to various reward levels or a correlation between a user's behavior and the behavior corresponding to a class of users. The system can determine an offer level that maximizes the return on the profit or revenue from a potential purchase for which the offer applies. | 02-03-2011 |
20110029364 | METHOD AND SYSTEM FOR PRESENTMENT AND REDEMPTION OF PERSONALIZED DISCOUNTS - The presentment and redemption system offers discounts directly to consumers through their mobile phones. The discounts are based upon the user of the mobile phone meeting a targeting criterion and the discounts are determined using the targeting criterion. Mobile phone users that do not meet the targeting criterion are not eligible for the discount. Because the discounts can be targeted to each individual consumer, there can be a better correlation between consumers' interests and the transmitted discounts. | 02-03-2011 |
20110029370 | METHOD AND SYSTEM FOR PRESENCE DETECTION - The transmission system transmits an encrypted identifier ultrasonically in an open-air environment using an ultrasonic transmitter. The ultrasonic identifier is associated with a location, which may be a store or a department within a store, and may be received by a microphone on a mobile phone. The identifier may be used to infer presence of the mobile phone user at the location associated with the identifier. The transmitter may include an ultrasonic transducer. The system may further provide a reward, responsive to inferring presence at the location. | 02-03-2011 |
20110225652 | IDENTITY THEFT COUNTERMEASURES - In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing. | 09-15-2011 |
20110279471 | Visual Cryptography and Voting Technology - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 11-17-2011 |
20120144472 | Fraud Detection - In some embodiments, techniques for information security include receiving information related to an authentication credential, wherein the information is related to a failed authentication attempt; determining whether the authentication credential is related to a valid account; and performing a security measure related to the valid account, if it is determined that the authentication credential is related to the valid account. | 06-07-2012 |
20120178478 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 07-12-2012 |
20120226761 | Updating an Entry in an Addressee-Based Whitelist - In some embodiments, techniques may include receiving an email message; determining a non-recipient email addressee associated with the email message, wherein the non-recipient email addressee has an address that is unaffiliated with a recipient for which the email message has been received; receiving a directive to whitelist the non-recipient email addressee; and responsive to receiving the directive to whitelist the non-recipient email addressee, adding the non-recipient email addressee to a whitelist. | 09-06-2012 |
20120284799 | VISUAL CRYPTOGRAPHY AND VOTING TECHNOLOGY - In some embodiments, techniques for voting and visual cryptography may include various enhancements. | 11-08-2012 |
20130243188 | DATA PRIVACY - In some embodiments, techniques for data security may include encoding and decoding unreadably encoded data, such as data encrypted with a public key or tokenized. In some embodiments, techniques for data security may include distributing an encrypted private key. In some embodiments, unreadable data may be encrypted and/or decrypted using time-varying keys. | 09-19-2013 |
20130316743 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 11-28-2013 |
20140201835 | IDENTITY THEFT COUNTERMEASURES - In some embodiments, techniques for computer security comprise preventing and/or mitigating identity theft such as phishing. | 07-17-2014 |
20140220883 | PRESENCE DETECTION USING BLUETOOTH AND HYBRID-MODE TRANSMITTERS - Presence detection using Bluetooth and hybrid-mode transmitters is disclosed. In some embodiments, one or more transmitters are configured to transmit an iBeacon broadcast and a proprietary Bluetooth Low Energy (BTLE) broadcast, wherein at least one of the transmitted broadcasts includes an identifier that specifies a venue. The broadcasts are captured by a handset and decoded to infer presence of the handset at the venue. | 08-07-2014 |
20140222574 | PRESENCE DETECTION USING BLUETOOTH AND HYBRID-MODE TRANSMITTERS - Presence detection using Bluetooth and hybrid-mode transmitters is disclosed. In some embodiments, a transmitter is configured to broadcast a secure identifier comprising a venue identifier using Bluetooth Low Energy (BTLE) and/or an ultrasonic audio channel. The secure identifier broadcast by the transmitter is captured by a handset and decoded to infer presence of the handset at a venue identified by the venue identifier. | 08-07-2014 |
20150065168 | MOBILE SURVEILLANCE - In some embodiments, a technique for logging an item encountered by a mobile device comprises automatically detecting an item in an uncontrolled environment, extracting an identity associated with the item, logging an encounter, wherein the encounter includes the identity, and deleting the encounter after a predetermined period of time has elapsed, wherein the encounter is not marked as relevant. | 03-05-2015 |