Patent application number | Description | Published |
20100324994 | LOCATION BASED SERVICE FOR DIRECTING ADS TO SUBSCRIBERS - In one embodiment, a method of providing a location based service (LBS), comprises: (i) receiving location information over a period of time by one or more software programs from a plurality of wireless devices belonging to a plurality of subscribers; (ii) processing the location information to detect that respective subscribers tend to spend time at one or more locations with one or more other specific subscribers; (iii) storing data indicative of a tendency of each such subscriber to spend time with the subscriber's one or more other specific subscribers; (iv) detecting whether subscribers are present at locations with one or more specific subscribers identified in the stored data subsequent to performance of (ii) and (iii); and (v) comparing ad parameters against subscriber data, to select ads for communication to subscribers, wherein the comparing differentiates in selection of ads for communication to subscribers in response to (iv). | 12-23-2010 |
20110119734 | ACCESS CONTROL IN A SECURED FACILITY - In one embodiment, a system processes access decisions for individuals where the system includes a portable handheld housing for the processor, display, internal memory, and card reader of the system. The system further includes software comprising: code for downloading, in a first mode of operation through the wireless communication circuitry, to the internal memory, access rights information from a distribution server, the access rights information, for multiple users, independently originating and being cryptographically authenticated from multiple sources, the access rights information revocation data that is specific to respective identified individual users; code for reading and processing identity information and access rights information from a portable memory card via the reader in a second mode of operation, the identify information comprising first and last name information pertaining to a specific user and employer organization information of the specific user, the code for reading and processing cryptographically authenticating information. | 05-19-2011 |
20110196926 | Method of conducting operations for a social network application including notification list generation with offer hyperlinks according to notification rules - In one embodiment, a method of conducting operations for a social network application, comprises: generating a notification list of recent activities of users of the social network application, wherein the notification list includes (1) at least one activity within the social network application of a first user and (2) at least one hyperlink to an offer involving an activity that is directly related to at least one activity of the first user, wherein an account of the first user defines at least one notification rule for controlling visibility of the at least one activity to other users of the social network application; and providing the notification list to a second user, that is a friend of the first user within the social network application, according to the at least one notification rule of the first user. | 08-11-2011 |
20120068814 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units, comprises: generating second data reflective of dynamic events within the secured facility, the second data being indicative of the user of the at least one of the access control cards initiating one of the at least two separate event sequences; and performing access control decisions for the user of the at least one card according to the first data and the second data, wherein (i) the access control decisions permit the user of the at least one access cards to traverse through an event sequence initiated by the user, and (ii) the access control decisions prevent the user from traversing through another event sequence until the user completes the event sequence initiated by the user. | 03-22-2012 |
20120068816 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units physically distributed at different physical locations within the secured facility, comprises: processing the first data, by software executed on one or more processor based systems, against the defined topology to define second data that is reflective of role-based user norms within the secured facility across respective event sequences within the secured facility, wherein at least some of the event sequences include at least three event nodes; and processing substantially real-time event data, by software executed on one or more processor based systems, against the second data to identify current activity of users within the secured facility as anomalous user activity for increased security inspection. | 03-22-2012 |
20120072995 | SYSTEMS AND METHODS FOR MANAGING SOFTWARE LICENSES - In one embodiment, an apparatus for managing software licenses comprises: a plurality of computers connected together in a peer to peer computer network wherein each computer is a computer node of the network; wherein each computer node comprises a software license management controller that operates in one of: a disconnected mode of operation of distributed license management without network connectivity and a normal online mode of operation of distributed license management. | 03-22-2012 |
20120098638 | SYSTEMS AND METHODS OF OPERATING A SECURED FACILITY - In one embodiment, a method of providing security operations in a secured facility in which access control operations are performed, wherein the secured facility includes a plurality of access control units physically distributed at different physical locations within the secured facility, comprises: performing access control decisions for the user of the at least one card according to the first data and the second data, wherein (i) the access control decisions determine whether a dynamic event variable set to a value determined by the second data satisfies a constraint defined by the first data or whether temporary tolerance data permits deviation from an applicable access control parameterized rule, and (ii) the access control decisions are performed in a de-centralized manner substantially where the access cards are presented to access control units without requiring access control logic being involved at a central access control system. | 04-26-2012 |
20120289208 | Method of conducting operations for a social network application including activity list generation - In one embodiment, a method of conducting operations for a social network application, comprises: generating a notification list of recent activities of users of the social network application, wherein the notification list includes (1) at least one activity within the social network application of a first user and (2) at least one hyperlink to an activity that is directly related to at least one activity of the first user, wherein an account of the first user defines at least one notification rule for controlling visibility of the at least one activity to other users of the social network application; and providing the notification list to a second user, that is a friend of the first user within the social network application, according to the at least one notification rule of the first user. | 11-15-2012 |
20120289209 | Method of conducting operations for a social network application including activity list generation - In one embodiment, a method of conducting operations for a social network application, comprises: generating a notification list of recent activities of users of the social network application, wherein the notification list includes (1) at least one activity within the social network application of a first user and (2) at least one hyperlink to an activity that is directly related to at least one activity of the first user, wherein an account of the first user defines at least one notification rule for controlling visibility of the at least one activity to other users of the social network application; and providing the notification list to a second user, that is a friend of the first user within the social network application, according to the at least one notification rule of the first user. | 11-15-2012 |
20130013689 | Method of conducting operations for a social network application including activity list generation - In one embodiment, a method of conducting operations for a social network application comprises: operating at least one social network application server for interacting with users of the social network application; maintaining user accounts for users of the social network application, the user accounts including data defining relationships between users of the social network application; logging activities of users, the logged activities including real-world activities other than direct use of the social network application; generating a notification list of recent activities of users of the social network application, wherein the notification list includes (1) at least one real-world activity of a first user of the social network application and (2) at least one hyperlink to offer for an activity that is directly related to the at least one real-world activity of the first user. | 01-10-2013 |
20140108140 | METHOD OF CONDUCTING SOCIAL NETWORK APPLICATION OPERATIONS - In one embodiment, a computer-implemented method comprises: receiving, by a social networking system, location information for a device associated with a first user of the social networking system; associating the location information with the first user in a user profile associated with the first user of the social networking system; sending, from the social networking system, to a second user a communication generated based at least in part on the location information. | 04-17-2014 |
20140108536 | METHOD OF CONDUCTING SOCIAL NETWORK APPLICATION OPERATIONS - In one embodiment, a method of sharing locations of users participating in a social networking service at a geographic location and communicating app related information of users participating in the social networking service, the method executed by a computer system and comprises: receiving location information and text descriptive information from a mobile device of a first user of the social networking service, the location information representing a geographic location of the first user, the text descriptive information manually provided by the first user on an input module of the mobile device; associating the location information with the text descriptive information of the first user in a database; sending the text descriptive information and the location information of the first user to a second user for display. | 04-17-2014 |
20140108537 | METHOD OF CONDUCTING SOCIAL NETWORK APPLICATION OPERATIONS - In one embodiment, a computer-implemented method comprises: receiving, by a social networking system, location information for a device associated with a first user of the social networking system; associating the location information with the first user in a user profile associated with the first user of the social networking system; sending, from the social networking system, to a second user a communication generated based at least in part on the location information. | 04-17-2014 |
20140108539 | METHOD OF CONDUCTING SOCIAL NETWORK APPLICATION OPERATIONS - In one embodiment, a method of sharing locations of users participating in a social networking service at a geographic location, the method executed by a computer system and comprises: receiving location information and text descriptive information from a mobile device of a first user of the social networking service, the location information representing a geographic location of the first user, the text descriptive information manually provided by the first user on an input module of the mobile device; associating the location information with the text descriptive information of the first user in a database; sending the text descriptive information and the location information of the first user to a second user for display. | 04-17-2014 |
20140108540 | METHOD OF CONDUCTING SOCIAL NETWORK APPLICATION OPERATIONS - In one embodiment, a method of sharing locations of users participating in a social networking service at a geographic location, the method executed by a computer system and comprises: receiving location information and text descriptive information from a mobile device of a first user of the social networking service, the location information representing a geographic location of the first user, the text descriptive information manually provided by the first user on an input module of the mobile device; associating the location information with the text descriptive information of the first user in a database; sending the text descriptive information and the location information of the first user to a second user for display. | 04-17-2014 |