Patent application number | Description | Published |
20090161919 | Device Detection with Secure Identity Authentication - Systems and methods for providing secure identity authentication amongst devices using identity information contained therein to facilitate data synchronization amongst the user devices, wherein the identity information in the devices are compared for authentication but not actually transmitted or exposed for unauthorized access to such information and to the devices. | 06-25-2009 |
20090276823 | METHOD AND APPARATUS FOR MODIFYING A COLOR OF AN ELECTRONIC HOUSING - A method and apparatus for modifying a color of an electronics housing ( | 11-05-2009 |
20110161147 | STIMULUS/RESPONSE-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161472 | CLIENT-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161473 | ANALYTICS-BASED BINDING OF IDENTIFIERS ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20110161474 | BROKERING INFORMATION ACROSS INFORMATION DOMAINS WHILE MAINTAINING CONFIDENTIALITY - Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity. | 06-30-2011 |
20120063586 | SECURE CALL DTMF SIGNALING - A method and system for secure call Dual-Tone Multi-Frequency (DTMF) signaling includes entering ( | 03-15-2012 |
20130035944 | PERSONALIZING COMMUNICATIONS BASED ON AN ESTIMATED SENSITIVITY LEVEL OF THE RECIPIENT - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130036173 | PERSONALIZING COMMUNICATIONS USING ESTIMATES OF THE RECIPIENT'S SENSITIVITY LEVEL DERIVED FROM RESPONSES TO COMMUNICATIONS - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130036174 | PERSONALIZING COMMUNICATIONS BASED ON AN ESTIMATED SENSITIVITY LEVEL OF THE RECIPIENT - A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information. | 02-07-2013 |
20130132330 | MANAGEMENT OF PRIVACY SETTINGS FOR A USER DEVICE - A system and methods of managing privacy settings of a user are presented here. The system obtains context information that is indicative of a contextual scenario associated with operation of a user device and determines, with a first analytics system, a first set of privacy settings predictions that is influenced at least in part by the context information. A second analytics system is used to determine a second set of privacy settings predictions that is influenced at least in part by the context information. When the first set of privacy settings predictions differ from the second set of privacy settings predictions by at least a threshold amount, the system issues a query for user-specified privacy settings for the contextual scenario. | 05-23-2013 |
20130346414 | Correlation Engine and Method for Granular Meta-Content Having Arbitrary Non-Uniform Granularity - One disclosed method includes receiving correlation instructions related to a plurality of meta-content elements that are associated with a primary content. The primary content may be multimedia content such as, but not limited to, an audiovisual content. The method includes performing a correlation in response to receiving the instructions. The correlation is between the meta-content elements, where the meta-content elements each have an arbitrary granularity defining meta-content segments. The method returns a result based on the correlation. Another disclosed method include receiving a request having correlation instructions related to a plurality of meta-content elements, where the meta-content elements are associated with a primary content. Again, each meta-content element has an arbitrary granularity defining meta-content segments. The method includes determining, in response to receiving the request, a composite of meta-content segments of the plurality of meta-content elements, based on the correlation instructions. | 12-26-2013 |
20130347056 | Content Rights Protection with Arbitrary Correlation of Second Content - A disclosed content rights management system defines a content usage policy via a conditional rule set contained in metadata. The conditional rule set is correlated to at least one second content. An access control manager determines, dynamically, access rights conferrable to a user device or a server, based on the content usage policy and user history parameters. The embodiments may confer limited access rights for a first activity by a user device, or by a server, with respect to the protected content and the second content, and block a second activity with respect to the protected content and the second content, in response to determining that the request for the second content, in conjunction with the user history parameters, does not comply with the conditional rule set for the second activity. | 12-26-2013 |
20130347057 | Privacy Manager for Restricting Correlation of Meta-Content Having Protected Information Based on Privacy Rules - A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions. | 12-26-2013 |
20140101110 | HIGH AVAILABILITY EVENT LOG COLLECTION IN A NETWORKED SYSTEM - A method includes storing data received at a first server to a first file and storing data received at a second server to a second file, where the data in the two files are substantially similar. The two files are distinct, independent files. The first server provides a copy of the first file to the second server to store. The first server then stores additional data to the first file, while the second server maintains the copy of the first file unchanged. The second server may also provide a copy of the second file to the first server to store and continues to store additional data to the second file, while maintaining the copy of the second file on the first server unchanged. Event reports may then be generated using the various files, which provide high availability due to the above method and corresponding system arrangement. | 04-10-2014 |
20140245452 | RESPONDING TO A POSSIBLE PRIVACY LEAK - When a user is about to perform a “communicative act” (e.g., to send an e-mail or to post to a social-networking site), the proposed communicative act is reviewed to see if it may lead to a privacy leak. If, upon review, it is determined that performing the proposed communicative act could lead to a privacy leak, then an appropriate response is taken, such as preventing the proposed act from being performed or suggesting a modification to the proposed act that would lessen the likelihood of a privacy leak. A privacy server creates a privacy profile for a user based on information about the user's personae and how those personae are used. Using that profile, the privacy server can judge whether a proposed communicative act would support an unwanted inference. | 08-28-2014 |