Patent application number | Description | Published |
20080215631 | ENHANCING WEB EXPERIENCES USING BEHAVIORAL BIOMETRIC DATA - A computerized method that provides a Web page having control structures for gathering behavioral biometrics. The method can receive behavioral biometric data in accordance with the control structures and in accordance with interactions of a user with the Web page. Additionally, the method can compare the received behavioral biometric data with at least one set of previously established values. The user can be profiled based upon comparison results. This profiling can affect the manner in which Web pages are provided to the user as well as the content contained therein. | 09-04-2008 |
20080218475 | METHOD AND APPARATUS FOR DYNAMICALLY MODIFYING WEB PAGE DISPLAY FOR MOBILE DEVICES - A method of dynamically modifying web page displays used in various mobile devices. The method uses a motion detection mechanism to detect whether the mobile device is moving or in motion and then modifies web page displays sent to the device based upon the sensor readings. As such, the method, system, and apparatus are capable of automatically modifying a display provided to a mobile device based upon a determination that the user and/or device are moving and/or in motion. In another aspect, the method, system, and apparatus are also capable of modifying the complexity of a display provided to a mobile device based upon the degree of movement and/or motion by the user and/or device. | 09-11-2008 |
20090006856 | ADAPTIVE AUTHENTICATION SOLUTION THAT REWARDS ALMOST CORRECT PASSWORDS AND THAT SIMULATES ACCESS FOR INCORRECT PASSWORDS - In the invention, incorrect authentication information for accessing at least one secured computing asset can be received. A similarity score between the incorrect authentication information and correct authentication information can be determined. One of many different access levels can be assigned to a computing session based upon the similarity score. Access consistent with the assigned access level can be granted. One access level can be an emulation access level that grants access to at least one simulated asset designed to mimic the secured asset. Access to the simulated asset can be provided in a fashion so that a user, who is likely an intruder, is unaware that they are not receiving the secured asset information. A tracking action can he optionally initiated against the intruder. Further, user behavior with the simulated session or a limited access session can be compared against a behavior profile to dynamically increase or decrease session permissions. | 01-01-2009 |
20090079833 | TECHNIQUE FOR ALLOWING THE MODIFICATION OF THE AUDIO CHARACTERISTICS OF ITEMS APPEARING IN AN INTERACTIVE VIDEO USING RFID TAGS - The present solution can include a method for allowing the selective modification of audio characteristics of items appearing in a video. In this method, a RFID tag can be loaded with audio characteristics specific to a sound-producing element. The RFID tag can then be attached to an item that corresponds to the sound-producing element. The video and audio of the area including the item can be recorded. The audio characteristics can be automatically obtained by scanning the RFID tag. The audio characteristics can then be embedded within the video so that the audio characteristics are available when the item appears in the video. | 03-26-2009 |
20100198919 | MESSAGE-BASED TECHNIQUE FOR SHARING DISTRIBUTION LIST CONTENTS WITHIN ELECTRONIC MESSAGING SYSTEMS - Prior to transmission, distribution list data associated with a user-defined distribution list can be embedded within an electronic message. The recipients of the electronic message should be members of an electronic communications system. The distribution list data can include a copy of the user-defined distribution list or a reference to a storage location containing the user-defined distribution list where access control policies can be applied. The electronic message can be conveyed to the recipients. In response to the user-selection of a user-defined distribution list during presentation of the electronic message, the recipient can be presented with distribution list options within a user interface. The distribution list options can represent actions to be performed upon the contents of the user-selected user-defined distribution list. Prior to execution of a user-selected distribution list option, the contents of the user-selected user-defined distribution list can be accessed using the embedded distribution list data. | 08-05-2010 |
20110178889 | A METHOD, MEDIUM, AND SYSTEM FOR ALLOCATING A TRANSACTION DISCOUNT DURING A COLLABORATIVE SHOPPING SESSION - A collaborative shopping group can be established within a social networking web site. This initially established group can consist of individuals with whom the establishing user has a social networking affiliation. After an initial establishment of the collaborative shopping group, each individual within the group is able to add additional individuals to the collaborative shopping group. A shared shopping cart can be established for the collaborative shopping group. A set of different members of the collaborative shopping group can individually and independently add items from a set of different e-commerce sites to the shared shopping cart. An e-commerce purchase of items in the shared shopping cart can be completed. The completed e-commerce purchase can receive a transaction discount greater than or equal to a sum of discounts that would have resulted from discrete purchases of the items of the shared shopping cart by the individuals of the collaborative shopping group. | 07-21-2011 |
20110179058 | ENABLING WORKFLOW AWARENESS WITHIN A BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM - Enabling workflow awareness within a business process management (BPM) system can utilize a workflow awareness controller that can receive an instantiation request for a workflow. The workflow can be comprised of multiple workflow steps to be performed by the BPM system. From workflow metadata, workflow redundancies, at the instance or step level, can be determined with other workflow instances initiated prior to the receipt of the instantiation request. The workflow metadata can include records that uniquely represent the operating parameter values of the prior workflow instances. When a workflow redundancy exists, persistent workflow data corresponding to the workflow redundancy can be utilized during the performance of a workflow instance of the requested workflow within the BPM system. The persistent workflow data can replace the performance of one or more workflow steps of the workflow instance, which can reduce the redundant performance of the workflow steps for the requested workflow. | 07-21-2011 |
20110238458 | DYNAMICALLY OPTIMIZED DISTRIBUTED CLOUD COMPUTING-BASED BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM - A workflow server can receive requests, each for a business process workflow conforming to a business process model. Each business process workflow can include a set of interdependent tasks. The workflow server can satisfy received requests by assigning tasks to different service providers that provide software services. Each of the tasks can be assigned to corresponding ones of the software services. For each task, the workflow server can also defines an allocated cost per software service, and a time allocation per software service for completing the corresponding one of the tasks. Different service providers, including those assigned to tasks, can receive information for ones of the tasks not directly assigned to them by the workflow server. The different service providers can then bid on these tasks. Wherein when bids are won, tasks for a business process flow can be reassigned based on winning bids. | 09-29-2011 |
20120077483 | ENABLING INTERFACE AGGREGATION OF MOBILE BROADBAND NETWORK INTERFACES - A network traffic associated with a communication request within a computing device can be identified. The device can comprise of a first and second communication stack which can addresses a first and a second network interface within the computing device. The first network interface can be associated with a mobile broadband network and the second network interface can be associated with a computing network. A first and second portion of the network traffic associated with the communication request can be programmatically determined to be conveyed to the first and second network interfaces. The first and second portions of network traffic can be conveyed simultaneously to the mobile broadband network associated with the first network interface and the computing network associated with the second network interface. | 03-29-2012 |
20120117016 | AUTONOMOUS INTELLIGENT CONTENT ITEMS - One embodiment of the disclosure provides a storage unit of digitally encoded information stored on a non-transitory storage medium. The storage unit can be referred to as an intelligent content item. The intelligent content item can include an intelligent wrapper, content data, and intelligent functions. The intelligent wrapper can enable the intelligent content item to function as a self-managing unit of storage. The content data can be contained within the intelligent wrapper. The intelligent functions can be contained within the intelligent wrapper. The intelligent functions can represent abilities of the intelligent wrapper to autonomously and dynamically manage a state of the intelligent content item and manage specifics for content consumers to access and utilize the content data. | 05-10-2012 |
20130011111 | MODIFYING AUDIO IN AN INTERACTIVE VIDEO USING RFID TAGS - Video and audio of a capture area is recorded. The capture area includes a sound-producing element that is to appear within a video. A radio-frequency identification (RFID) tag is attached to the sound-producing element. The RFID tag is scanned to automatically track the sound producing element relative to a position in the capture area. Configurable audio associated with the sound-producing element is embedded within the video. | 01-10-2013 |
20130024203 | PROVIDING DYNAMIC RECOMMENDATIONS FOR POINTS OF INTEREST UTILIZING AUTOMATICALLY OBTAINED COLLECTIVE TELEMETRY TO ENHANCE USER EXPERIENCE - A schedule and recommendations associated with one or more points of interest can be identified. The points of interest can be associated with a geographical region. Telemetry associated with a one or more computing devices can be received. The computing devices (e.g., mobile phone with sensors) can be associated with one or more points of interest. Telemetry data can be evaluated against a recommendation criteria and the user preference. A schedule and recommendations can be determined based on the evaluating telemetry information, historic data, criteria and preferences. The schedule and recommendation(s) enhance visits to points of interest. | 01-24-2013 |
20130103539 | INTELLIGENT SHOPPING ASSISTANT - A method of on-premise customer support can include, responsive to logging a customer into a computerized shopping system on-premises of a store, recalling a shopping list associated with the customer. A route through the store can be generated automatically according to one or more items on the shopping list. | 04-25-2013 |
20130166372 | UTILIZING REAL-TIME METRICS TO NORMALIZE AN ADVERTISEMENT BASED ON CONSUMER REACTION - One or more consumers proximate to a kiosk can be detected. The kiosk can present a product advertisement associated with a product. The product can be a good or a service. Metrics associated with the consumers can be collected responsive to interacting with the product advertisement. The interaction can be a visual and aural interaction. The metrics can be analyzed to determine an impression associated with the consumers interacting with the product advertisement. The impression can be a rational descriptor and/or an emotional descriptor. The rational descriptor and/or emotional descriptor can be a computer readable value associated with a behavioral change of the consumers responsive to the interacting. A normalized content can be generated based on the impression associated with the consumer. The normalized content can adjust the product advertisement to improve the impression. | 06-27-2013 |
20130211953 | COLLABORATIVE SHOPPING ACROSS MULTIPLE SHOPPING CHANNELS USING SHARED VIRTUAL SHOPPING CARTS - A system for collaborative shopping comprising shopping devices interconnected by a network and respectively used by shoppers in a collaborative shopping session, and virtual shopping carts respectively associated with the shopping devices for sharing information on items of interest among the shoppers and enabling the shoppers to collaborate on the shopping. | 08-15-2013 |
20130218618 | DYNAMICALLY OPTIMIZED DISTRIBUITED CLOUD COMPUTING-BASED BUSINESS PROCESS MANAGEMENT (BPM) SYSTEM - A workflow server can receive requests, each for a business process workflow conforming to a business process model. Each business process workflow can include a set of interdependent tasks. The workflow server can satisfy received requests by assigning tasks to different service providers that provide software services. Each of the tasks can be assigned to corresponding ones of the software services. For each task, the workflow server can also defines an allocated cost per software service, and a time allocation per software service for completing the corresponding one of the tasks. Different service providers, including those assigned to tasks, can receive information for ones of the tasks not directly assigned to them by the workflow server. The different service providers can then bid on these tasks. Wherein when bids are won, tasks for a business process flow can be reassigned based on winning bids. | 08-22-2013 |
20130268969 | ALLOWING PRESENTATION CONTROL OF IMMEDIATE CONTENT INTERRUPTING DIGITAL TELEVISION CHANNEL PROGRAMMING - A channel programming associated with a channel can be selected. The channel can be associated with a programming broadcasting system. The channel programming can be displayed upon a presentation device. An immediate content from a content delivery entity interrupting the presentation of the channel programming can be received. The channel programming and the immediate content can be simultaneously presented on the presentation device. | 10-10-2013 |
20130305315 | MULTI-MEDIA IDENTITY MANAGEMENT SYSTEM - A method for utilizing multi-media identities for access control to a secure area or item can begin with a multi-media identity management system providing a multi-media identity to an entity for use with an access control system. The multi-media identity can be a digital identifier defining multi-media authentication data and security privileges for the entity. The provided multi-media identity and multi-media authentication data can be received in an access request for a secure area or item. The multi-media authentication data can be verified against the multi-media data elements of the multi-media identity. The security privileges of the multi-media identity can be validated for the secure area or item. When the multi-media authentication data, multi-media identity, and security privileges are valid, the entity can be granted access and denied access when at least one item is invalid. | 11-14-2013 |
20130317950 | CUSTOMIZING A THREE DIMENSIONAL VIRTUAL STORE BASED ON USER SHOPPING BEHAVIOR - A planogram associated with a physical store can be identified. The physical store can be associated with an inventory. A virtual store comprising of a layout can be created. The virtual store can be a three dimensional environment permitting electronic commerce transactions. The layout of the virtual store and the planogram of the physical store can be identical. The layout can be a position or an orientation of an inventory item associated with the physical store inventory. The virtual store can be customized based on a personalization data. The customization can be an inventory item position and an orientation. The layout of the customized virtual store can be different from the planogram of the physical store. | 11-28-2013 |
20150039422 | COMMUNICATION WITH SHOPPERS IN A RETAIL ENVIRONMENT - Communication plans are created, modified, and executed by a campaign server. The campaign server creates a retail environment communication plan that specifies communications to be made to unidentified shoppers in a retail environment that includes at least one sensor. The campaign server identifies a shopper in the retail environment by the at least one sensor, and creates a shopper communication plan, based on the retail environment communication plan, that specifies communications to be made to the identified shopper in the retail environment. The campaign server executes the retail environment communication plan and the shopper communication plan. In response to processing an event sensed by the at least one sensor, the campaign server modifies one or both of the retail environment communication plan and the shopper communication plan. | 02-05-2015 |