Patent application number | Description | Published |
20080207180 | METHOD AND APPARATUS FOR LOCATING A MOBILE COMMUNICATIONS DEVICE - A computer implemented method, apparatus, and computer program product for locating a mobile communications device. The process authenticates the communication according to a set of instructions in response to receiving the communication from a user. In response to authenticating the communication, the process activates a signal generator for the mobile communications device. | 08-28-2008 |
20080215455 | Comparison Shopping Via Financial Management Software - The invention comprises a financial management program and one or more databases containing information on merchants and their products. The program interacts with the databases containing the product information to return the prices and availability of goods located in a designated area. The program compares prices from various merchants and displays the results to the consumer. The program also allows the consumer to compare the prices with a household budget an financial data, while keeping track of trends in the consumer's spending and buying habits. | 09-04-2008 |
20080250478 | Wireless Public Network Access - Public access to a network is provided through wireless access points, which may simultaneously support secured network access; in preferred embodiments, the access points are routers (such as “WiFi” routers). Accordingly, a router is configured with a public access profile (or profiles), which may be selectively enabled or disabled. When enabled, the router sends out an identifier that can be used to associate a client device with a public (i.e., unauthenticated) access path through the router to a network. The router also sends out a conventional identifier that can be used to associate another client device with a secured (i.e., authenticated) access path through the router, where the public and secured access paths are usable simultaneously by clients of the router. | 10-09-2008 |
20080270788 | EXTENSION OF X.509 CERTIFICATES TO SIMULTANEOUSLY SUPPORT MULTIPLE CRYPTOGRAPHIC ALGORITHMS - A technique permitting an X.509 certificate to simultaneously support more than one cryptographic algorithm. An alterative public key and alternative signature are provided as extensions in the body of the certificate. These extensions define a second (or more) cryptographic algorithm which may be utilized to verify the certificate. These are not authenticated by the primary signature and signature algorithm in the primary cryptographic algorithm. These newly defined extensions are reviewed by a receiving entity if the entity does not support the cryptographic algorithm of the primary signature. | 10-30-2008 |
20080285751 | Deterring Theft of Media Recording Devices by Encrypting Recorded Media Files - Techniques are disclosed for deterring theft of media recording devices. Input received from a sensor, or some portion of the input, is encrypted prior to storing a media file. A decryption key must be provided when the media file is to be played back. If the key is not provided, then the file is preferably still played back, but is played back in a degraded manner. For example, a background color or other filler may be rendered in place of the encrypted portion. Additional parts of the file may also be degraded during playback. By making the playback unpleasant for the listener/viewer, theft of the recording device will be much less desirable—yet recording can continue uninterrupted, thereby minimizing disruption to legitimate users. The disclosed techniques may also be used to deter theft of the recorded media. | 11-20-2008 |
20090080852 | Audiovisual Censoring - A method, apparatus, system and program product are provided for selectively censoring recorded program content while displaying a program. The method comprising the steps of: in response to a first input, identifying a first boundary; in response to a second input, identifying a second boundary; and censoring the content between the first boundary and the second boundary. A method for displaying a censored program excluding censored program content, comprises the steps of: playing a program for which a start point and an end point for censoring are identified; in response to reaching the start point, skipping program content; and in response to reaching the end point, resuming playing the program. | 03-26-2009 |
20090097625 | Method of and System for Controlling Conference Calls - A method of and a system for controlling a conference call among a plurality of participants monitor the lines associated with the participants. When the system detects a ring on a line associated with one of the participants, the system mutes the line associated with that participant. In some embodiments, the system automatically mutes the line. In other embodiments, the system provides a mechanism by which a moderator can mute the line. In one embodiment, the detected ring may comprise an audible ring tone picked up by the telephone of the participant, as for example the participant's cell phone ringing. The system may identify the participant to the moderator and enable the moderator to mute the participant's line. The system may identify the participant by displaying identifying information for the participant on a computer display associated with the moderator. The system may display a muting control associated with the identifying information. The system may enable the moderator or the participant to unmute the line associated with the participant. In other embodiments, the detected ring may comprise a on-hold callback ring signal on participant's line. The system may automatically mute the line in response to detecting the callback ring signal. The system may monitor the muted line for an answer. Upon detecting an answer on line, the system may announce on the line that the line is muted, and provide instructions on rejoining said conference call. | 04-16-2009 |
20090204855 | FILE ERROR IDENTIFICATION, REPORTING, AND REPLACEMENT OF MEDIA FILES - The present invention discloses a solution for automatically replacing a media files upon a device able to identify problems with locally stored media files. Initially, an automated process or user of a media playing device can initially identify a media file, which the media playing device is unable to play. The media playing device can be connected to an external device associated with a media store including a set of source media files. The source media files of the media store can be automatically queried for a corresponding one of the detected media file. A copy of a source media file resulting from the query can be automatically conveyed from the media store to the media playing device. | 08-13-2009 |
20090222849 | Audiovisual Censoring - A method, apparatus, and program product are provided for selectively censoring recorded program content while displaying a program. In response to a first input, a first boundary is identified. In response to a second input, a second boundary is identified. The boundaries are associated to form a boundary pair defining censored content there between. Substitute content is retrieved or created. The content between the first boundary and the second boundary is censored by displaying the substitute content in place of the censored content. | 09-03-2009 |
20090239549 | ENHANCED WIRELESS ACCESS POINT COMMUNICATIONS WHILE TRAVELING - A method, system and computer program product for enhancing the acquisition of data from a wireless access point during a window of acquisition. A wireless device in a vehicle obtains a list of wireless access points positioned along a route being traveled by a user of the wireless device. The wireless device acquires its current location and identifies the closest upcoming wireless access point in connection with its current location. If the wireless device had previously had a session with the upcoming wireless access point, then the wireless device continues sending packets to the upcoming wireless access point from the point of previous termination with the upcoming wireless access point until the session is restarted. The wireless device then accesses data from the upcoming wireless access point during the remaining window of acquisition. | 09-24-2009 |
20090240623 | Business Event Triggered, Policy-Driven Payment Management - Techniques are disclosed for using business events as triggers to drive payment processing for electronic commerce. As the business logic of a merchant's e-commerce software application reaches various stages that impact payment considerations, it issues a corresponding event notification. According to preferred embodiments, these event notifications are processed by a policy engine, which locates policy information or rules previously configured for that event. Actions are then carried out, based on the configured policy. The merchant e-commerce application is therefore shielded from the details of the underlying payment processing. New payment types can be provided, and existing payment types can be modified if necessary, by adding/modifying policies; the merchant's e-commerce application does not need to change. This event-driven model allows application developers to focus on creating software for the merchant's key business requirements, and makes it easier to maintain the software. | 09-24-2009 |
20090295534 | Using an RFID Device to Enhance Security by Determining Whether a Person in a Secure Area is Accompanied by an Authorized Person - Embodiments of the invention are generally directed to controlling access to an area or enclosed location, wherein any person in possession of a specified RFID badge or other RFID device is defined to be a person who is authorized to be in the area or location. One embodiment, directed to a method, includes the step of detecting the presence of a particular person in the area, who is not in possession of a specified RFID device. In response to detecting the presence of the particular person, a search is initiated to determine whether any authorized person is present in the area. Upon sensing the presence of one or more authorized persons in the area, the method further determines whether any of the sensed authorized persons is accompanying the particular person. In response to determining that no authorized person is accompanying the particular person, prespecified corrective action is initiated with respect to the particular person. | 12-03-2009 |
20090310768 | SOCIAL NETWORK BASED CALL MANAGEMENT - Illustrative embodiments provide a computer implemented method, an apparatus in the form of a data processing system and a computer program product for social network based call management. In one illustrative embodiment, the computer implemented method comprises receiving an incoming call from a caller for a subscriber, and obtains preferences for the subscriber, wherein the preferences describe a caller relationship to the subscriber. Using a location provided in the preferences for the subscriber, the computer implemented method locates attributes for the caller. The computer implemented method processes the call in accordance with the attributes and the preferences. | 12-17-2009 |
20090313010 | AUTOMATIC PLAYBACK OF A SPEECH SEGMENT FOR MEDIA DEVICES CAPABLE OF PAUSING A MEDIA STREAM IN RESPONSE TO ENVIRONMENTAL CUES - A multimedia device can be used to play audio. Speech in an environment proximate to a multimedia device can be detected. The detected speech can be recorded. The playing of the audio can be paused. The recorded speech can be audibly presented. A condition to resume the paused audio can be detected. The paused audio can be resumed from the previously paused position. | 12-17-2009 |
20090319673 | Automated Wireless Device Pairing - Illustrative embodiments provide a computer implemented method, an apparatus in the form of a data processing system and a computer program product for performing automated wireless device pairing. In one illustrative embodiment, the computer implemented method comprises initiating by one device, detection of a another device and responsive to detecting the another device, transmitting a pairing information as a light signal from the one device to the another device. The computer implemented method further comprises determining whether the another device received the pairing information, and responsive to receiving the pairing information, completing a pairing process to form paired devices. | 12-24-2009 |
20100205626 | SYSTEM AND METHOD FOR IDENTIFYING AND DOWNLOADING BROADCAST PROGRAMMING CONTENT - The present invention is directed to a system, method and program product for identifying and downloading broadcast programming. Systems are disclosed that include a media device structured to receive and sample broadcast programming, and an identification service including an electronic library. The media device may include a receiver operable to receive the broadcast programming and media device information; a memory operable to save the received broadcast programming and media device information; a sampling device operable to replay and sample the received broadcast programming; and a transmitter operable to transmit the sampled broadcast programming and the media device information. The identification service may be structured to receive the sampled broadcast programming and the media device information, compare the sampled broadcast programming and the media device information with library information stored in the electronic library, and retrieve at least one of a matching broadcast programming and identification information about the broadcast programming. | 08-12-2010 |
20100209006 | APPARATUS, SYSTEM, AND METHOD FOR VISUAL CREDENTIAL VERIFICATION - A solution for visual credential verification. The solution includes an apparatus, system, and method embodiment. The apparatus for visual credential verification includes an input module, a comparison module, and a response module. The input module receives from a security official an image of an unverified credential, such as a badge, that an individual has presented to the security official. The comparison module determines whether or not the unverified credential is valid or invalid. The determination includes comparing the image of the unverified credential with known good images of valid credentials. The comparison module may also compare authentication information such as a photo of the individual, a name, or a badge number, with known good authentication information. Based on the comparison module's determination, the response module notifies the security official that the unverified credential is either valid or invalid. A system for visual credential verification may be implemented with a server in communication with a security official's electronic device, such as a cell phone. | 08-19-2010 |
20100317304 | Enhanced Radio - A system and method of controlling a portable radio may involve tuning a first receiver of the portable radio to a first broadcast from a first station, where the first broadcast includes specific program content. A switching event can be detected at the portable radio, where a second receiver of the portable radio may be tuned to a second broadcast from a second station in response to the switching event. The second broadcast can include the specific program content. | 12-16-2010 |
20130013708 | MAINTAINING MESSAGE PRIVACY ON AN EXPOSED DISPLAY DEVICE - A determination is made as to whether a computer is in a slide presentation mode. In response to determining that the computer is in the slide presentation mode, a configured designee alert mode is automatically selected. Message data is received through a communications medium. The message data is transferred to an alternate designated recipient according to the automatically selected designee alert mode when the computer is in the slide presentation mode. | 01-10-2013 |