Patent application number | Description | Published |
20130058470 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130059572 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one telephone communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one telephone communication. | 03-07-2013 |
20130060619 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060620 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; and negotiating presentation of at least one persona to the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060624 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060625 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one persona from a party to a transaction; evaluating the transaction; and negotiating receipt of at least one different persona from the party to the transaction at least partly based on an evaluation of the transaction. | 03-07-2013 |
20130060665 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060695 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060759 | Computational systems and methods for disambiguating search terms corresponding to network members - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data. | 03-07-2013 |
20130060848 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130060850 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060851 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one indication of an interaction involving at least one member of a network; creating a persona corresponding to the at least one member of a network, wherein the persona is at least partly based on the indication of an interaction; and presenting the persona for use in the interaction involving the at least one member of the network. | 03-07-2013 |
20130060852 | Computational systems and methods for regulating information flow during interactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one request for personal information from a party to a transaction; evaluating the transaction; selecting a persona at least partly based on an evaluation of the transaction, wherein the persona is linked to a unique identifier that is at least partly based on a user's device-identifier data and the user's network-participation data; and presenting the persona in response to the request for personal information. | 03-07-2013 |
20130060866 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060867 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one email communication from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one email communication. | 03-07-2013 |
20130060868 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130060869 | Computational systems and methods for identifying a communications partner - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one social network message from at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting the sender profile in association with the at least one. | 03-07-2013 |
20130061050 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20130061332 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130061333 | Computational systems and methods for verifying personal information during transactions - Methods, apparatuses, computer program products, devices and systems are described that carry out accessing at least one persona that includes a unique identifier that is at least partly based on a first user's device-identifier data and the first user's network-participation data; verifying the persona by comparing the first user's device-identifier data and the first user's network-participation data of the unique identifier to a second user's device-identifier data and the second user's network-participation data; and presenting the persona in response to a request for personal information. | 03-07-2013 |
20130066700 | GROUP TRANSACTION PROCESSING USING A SOCIAL STREAM - A user provides an input to a public stream system indicating that the user desires to conduct a transaction (such as a sale, renting a piece of equipment, etc.). The system identifies a group of other users that may wish to participate in the transaction, and at some point, informs those users of the opportunity to participate in a group transaction. Offers for the group transaction are identified and made available to the users and user acceptance of, and commitment to, the offer is tracked. Incentives can optionally be provided to one or more members of the group. | 03-14-2013 |
20130066876 | IDENTIFYING UNSEEN CONTENT OF INTEREST - Making an information retrieval process public, so that it can be followed by others, allows capturing of an interest graph that allows people to learn more about shared interests with other people. This also allows items of interest to a trusted resource (such as an expert) to be identified. These items can then be brought to the attention of other users that share the same interest as the expert. In addition, by keeping track of what particular content a user has already seen, the system can bring items of interest to the user's attention, where the user has not yet seen those items. | 03-14-2013 |
20130085843 | GESTURE BASED NAVIGATION TO AUXILIARY CONTENT - Methods, systems, and techniques for providing automatic navigation to auxiliary content. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables users to use a gesture-based user interface and dynamically define any content as a “link” for navigating to other content. In overview, the DGGS allows a user to use a gesture-based user interface to indicate some portion of content that is being presented on a presentation device associated with the user. This indicated portion is then used as a dynamic “link” (without necessitating a link being embedded in the underlying content) by the DGGS to navigate to other content or for other purposes. This dynamic cross-reference to other content is termed a “gesturelet.” The DGGS determines, based upon this gesturelet what content to present next to the user and then presents it accordingly. | 04-04-2013 |
20130085847 | PERSISTENT GESTURELETS - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Dynamic Gesturelet Generation System (DGGS), which enables one to dynamically define a gesturelet for navigating to or presenting other content, or for performing some behavior. In overview, the DGGS allows a portion of electronically presented content to be dynamically indicated by a gesture. The indicated portion can then be formed into a gesturelet and used by the DGGS to navigate to other content, perform a set of instructions, present auxiliary content, or for other purposes. Gesturelets may be stored persistently and associated with some auxiliary content, such as a set of behaviors, advertisements, competitions, supplemental material or images, or the like. Later, when an action in the system occurs such that the persistent representation is retrieved, the behavior associated with the persistent representation is performed and the associated auxiliary content presented. | 04-04-2013 |
20130085848 | GESTURE BASED SEARCH SYSTEM - Methods, systems, and techniques for automatically initiating a search to present auxiliary content in a gesture based input system are provided Example embodiments provide a Gesture Based Search System (GBSS), which enables a gesture-based user interface to invoke (e.g., execute, generate, initiate, perform, or cause to be executed, generated, initiated, performed, or the like) a search related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBSS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBSS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine input to a search. The search is then automatically initiated with the determined source input. Once search result content is determined, the result content is then presented to the user. | 04-04-2013 |
20130085849 | PRESENTING OPPORTUNITIES FOR COMMERCIALIZATION IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for automatically presenting commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine an opportunity for commercialization to present. An opportunity for commercialization may come in many forms, including, for example, a web page, code, document, or the like. Once the opportunity for commercialization is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130085855 | GESTURE BASED NAVIGATION SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Navigation System (GBNS), which enables a gesture-based user interface to navigate to auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBNS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBNS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to navigate to. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130086056 | GESTURE BASED CONTEXT MENUS - Methods, systems, and techniques for providing context menus based upon gestured input are provided. Example embodiments provide a Gesture Based Context Menu System, which enables a gesture-based user interface to invoke a context menu to present one or more choices of next actions and/or entities based upon the context indicated by the gestured input and a set of criteria. In overview, the GBCMS allows an area of electronically presented content to be dynamically indicated by a gesture and then examines the indicated area in conjunction with a set of criteria to determine and present a context menu of further choices available to the user. The choices may be presented in the form of, for example, a pop-up menu, a pull-down menu, an interest wheel, or a rectangular or non-rectangular menu. In some embodiments the menus dynamically change as the gesture is modified. | 04-04-2013 |
20130086499 | PRESENTING AUXILIARY CONTENT IN A GESTURE-BASED SYSTEM - Methods, systems, and techniques for automatically providing auxiliary content are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to present auxiliary content that is related to an portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, or the like) of electronically presented content to be dynamically indicated by a gesture. The GBCPS then examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine auxiliary content to present. Auxiliary content may be in many forms, including, for example, a web page, code, document, or the like. Once the auxiliary content is determined, it is then presented to the user, for example, using a separate panel, an overlay, or in any other fashion. | 04-04-2013 |
20130097669 | Behavioral fingerprint controlled theft detection and recovery - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130097683 | Trust verification schema based transaction authorization - A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 04-18-2013 |
20130104203 | BEHAVIORAL FINGERPRINT BASED AUTHENTICATION - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. In addition to the foregoing, other example aspects are described in the claims, drawings, and written description forming a part of the present disclosure. | 04-25-2013 |
20130106682 | Context-sensitive query enrichment | 05-02-2013 |
20130106683 | Context-sensitive query enrichment | 05-02-2013 |
20130106685 | Context-sensitive query enrichment | 05-02-2013 |
20130106695 | Context-sensitive query enrichment | 05-02-2013 |
20130106892 | Context-sensitive query enrichment | 05-02-2013 |
20130106893 | Context-sensitive query enrichment | 05-02-2013 |
20130106894 | Context-sensitive query enrichment | 05-02-2013 |
20130110804 | Context-sensitive query enrichment | 05-02-2013 |
20130117105 | ANALYZING AND DISTRIBUTING BROWSING FUTURES IN A GESTURE BASED USER INTERFACE - Methods, systems, and techniques for presenting auxiliary content and information regarding browsing and/or navigation futures to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer to one or more sponsors of content information regarding a next content to be examined by a user related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with potentially a set of (e.g., one or more) factors to determine a next content and distributes information to potential sponsors. Once auxiliary content is received or determined, it is then presented to the user when the next content is navigated to. | 05-09-2013 |
20130117111 | COMMERCIALIZATION OPPORTUNITIES FOR INFORMATIONAL SEARCHING IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting sponsor supplied content associated with commercial opportunities in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to determine and present sponsor supplied content associated with an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with possibly a set of (e.g., one or more) factors to determine which sponsor supplied content associated with an opportunity for commercialization to present. Once the sponsor supplied content associated with an opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated topic, object, and/or action. | 05-09-2013 |
20130117130 | OFFERING OF OCCASIONS FOR COMMERCIAL OPPORTUNITIES IN A GESTURE-BASED USER INTERFACE - Methods, systems, and techniques for presenting commercial opportunities to be used in a gesture-based user interface are provided. Example embodiments provide a Gesture Based Content Presentation System (GBCPS), which enables a gesture-based user interface to offer occasions for an opportunity for commercialization related to a portion of electronic input that has been indicated by a received gesture to one or more sponsors of content. In overview, the GBCPS allows a portion (e.g., an area, part, etc.) of electronically presented content to be dynamically indicated by a gesture. The GBCPS examines the indicated portion in conjunction with a set of (e.g., one or more) factors to determine which opportunity for commercialization to present which is dynamically or has been previously associated with the content indicated by the gesture. Once the opportunity for commercialization is determined, it is then presented to the user in conjunction with the indicated product and/or service. | 05-09-2013 |
20130117214 | Behavioral Fingerprinting Via Derived Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-09-2013 |
20130133033 | Behavioral fingerprint controlled automatic task determination - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function of the determined behavioral fingerprint and a direction received from the network-accessible user. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133052 | Behavioral fingerprint device identification - A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network-accessible user; and identifying a current device of the one or more devices as being currently used by the network-accessible user as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-23-2013 |
20130133054 | Relationship Based Trust Verification Schema - A computationally-implemented method, in accordance with certain example embodiments, may include, but is not limited to: receiving at a computer device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computer device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computer device a decision associated with the authentication request, the decision based at least partially on a trust verification schema generated from a relational mapping of the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 05-23-2013 |
20130135332 | Context-sensitive query enrichment - Structures and protocols are presented for facilitating a search partly based on a movement status of a search-capable device or on a position of a person's limb or on an association with another search-capable device. | 05-30-2013 |
20130141576 | DETERMINING THREATS BASED ON INFORMATION FROM ROAD-BASED DEVICES IN A TRANSPORTATION-RELATED CONTEXT - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured to perform vehicular threat detection based on information received at a road-based device, such as a sensor or processor that is deployed at the side of a road. An example AEFS receives, at a road-based device, information about a first vehicle that is proximate to the road-based device. The AEFS analyzes the received information to determine threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130142347 | VEHICULAR THREAT DETECTION BASED ON AUDIO SIGNALS - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based at least in part on analyzing audio signals. An example AEFS receives data that represents an audio signal emitted by a vehicle. The AEFS analyzes the audio signal to determine vehicular threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined vehicular threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130142365 | AUDIBLE ASSISTANCE - Techniques for sensory enhancement and augmentation are described. Some embodiments provide an audible assistance facilitator system (“AAFS”) configured to provide audible assistance to a user via a hearing device. In one embodiment, the AAFS receives data that represents an utterance of a speaker received by a hearing device of the user, such as a hearing aid, smart phone, media device, or the like. The AAFS identifies the speaker based on the received data, such as by performing speaker recognition. The AAFS determines speaker-related information associated with the identified speaker, such as by determining an identifier (e.g., name or title) of the speaker, by locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AAFS then informs the user of the speaker-related information, such as by causing an audio representation of the speaker-related information to be output via the hearing device. | 06-06-2013 |
20130142393 | VEHICULAR THREAT DETECTION BASED ON IMAGE ANALYSIS - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance a user's ability to operate or function in a transportation-related context as a pedestrian or a vehicle operator. In one embodiment, the AEFS is configured perform vehicular threat detection based at least in part on analyzing image data. An example AEFS receives data that represents an image of a vehicle. The AEFS analyzes the received data to determine vehicular threat information, such as that the vehicle may collide with the user. The AEFS then informs the user of the determined vehicular threat information, such as by transmitting a warning to a wearable device configured to present the warning to the user. | 06-06-2013 |
20130144490 | PRESENTATION OF SHARED THREAT INFORMATION IN A TRANSPORTATION-RELATED CONTEXT - Techniques for ability enhancement are described. In some embodiments, devices and systems located in a transportation network share threat information with one another, in order to enhance a user's ability to operate or function in a transportation-related context. In one embodiment, a process in a vehicle receives threat information from a remote device, the threat information based on information about objects or conditions proximate to the remote device. The process then determines that the threat information is relevant to the safe operation of the vehicle. Then, the process modifies operation of the vehicle based on the threat information, such as by presenting a message to the operator of the vehicle and/or controlling the vehicle itself. | 06-06-2013 |
20130144595 | LANGUAGE TRANSLATION BASED ON SPEAKER-RELATED INFORMATION - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to automatically translate utterances from a first to a second language, based on speaker-related information determined from speaker utterances and/or other sources of information. In one embodiment, the AEFS receives data that represents an utterance of a speaker in a first language, the utterance obtained by a hearing device of the user, such as a hearing aid, smart phone, media player/device, or the like. The AEFS then determines speaker-related information associated with the identified speaker, such as by determining demographic information (e.g., gender, language, country/region of origin) and/or identifying information (e.g., name or title) of the speaker. The AEFS translates the utterance in the first language into a message in a second language, based on the determined speaker-related information. The AEFS then presents the message in the second language to the user. | 06-06-2013 |
20130144603 | ENHANCED VOICE CONFERENCING WITH HISTORY - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance voice conferencing among multiple speakers. Some embodiments of the AEFS enhance voice conferencing by recording and presenting voice conference history information based on speaker-related information. The AEFS receives data that represents utterances of multiple speakers who are engaging in a voice conference with one another. The AEFS then determines speaker-related information, such as by identifying a current speaker, locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS records conference history information (e.g., a transcript) based on the determined speaker-related information. The AEFS then informs a user of the conference history information, such as by presenting a transcript of the voice conference and/or related information items on a display of a conferencing device associated with the user. | 06-06-2013 |
20130144619 | ENHANCED VOICE CONFERENCING - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to enhance voice conferencing among multiple speakers. In one embodiment, the AEFS receives data that represents utterances of multiple speakers who are engaging in a voice conference with one another. The AEFS then determines speaker-related information, such as by identifying a current speaker, locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS then informs a user of the speaker-related information, such as by presenting the speaker-related information on a display of a conferencing device associated with the user. | 06-06-2013 |
20130144623 | VISUAL PRESENTATION OF SPEAKER-RELATED INFORMATION - Techniques for ability enhancement are described. Some embodiments provide an ability enhancement facilitator system (“AEFS”) configured to determine and present speaker-related information based on speaker utterances. In one embodiment, the AEFS receives data that represents an utterance of a speaker received by a hearing device of the user, such as a hearing aid, smart phone, media player/device, or the like. The AEFS identifies the speaker based on the received data, such as by performing speaker recognition. The AEFS determines speaker-related information associated with the identified speaker, such as by determining an identifier (e.g., name or title) of the speaker, by locating an information item (e.g., an email message, document) associated with the speaker, or the like. The AEFS then informs the user of the speaker-related information, such as by presenting the speaker-related information on a display of the hearing device or some other device accessible to the user. | 06-06-2013 |
20130151515 | Behavioral Fingerprinting Via Social Networking Interaction - Disclosed herein are example embodiments for behavioral fingerprinting via social networking interaction. For certain example embodiments, at least one indication of family relation for at least one authorized user may be obtained via at least one social networking interaction, and the at least one indication of family relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 06-13-2013 |
20130151617 | BEHAVIORAL FINGERPRINTING VIA SOCIAL NETWORK VERIFICATION - Disclosed herein are example embodiments for behavioral fingerprinting via social network verification. For certain example embodiments, one or more devices may (i) detect at least one attempt to perform at least one task via at least one user device; and (ii) initiate transmission of at least one verification inquiry to one or more social network connections based at least partly on the at least one attempt to perform the at least one task via the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-13-2013 |
20130159217 | ENVIRONMENTALLY-RESPONSIVE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for environmentally-responsive behavioral fingerprinting. For certain example embodiments, one or more devices may: (i) obtain at least one environmental parameter relating to an event to potentially occur in conjunction with at least one user device; or (ii) perform at least one analysis for the event based at least partially on the at least one environmental parameter and at least partially on at least one utilization indicator of a behavioral fingerprint that is associated with the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130159413 | BEHAVIORAL FINGERPRINTING WITH SOCIAL NETWORKING - Disclosed herein are example embodiments for behavioral fingerprinting with social networking. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130160087 | BEHAVIORAL FINGERPRINTING WITH ADAPTIVE DEVELOPMENT - Disclosed herein are example embodiments for behavioral fingerprinting with adaptive development. For certain example embodiments, one or more devices may: (i) determine at least one indication of utilization for at least one authorized user via at least one user-device interaction; and (ii) incorporate at least one indication of utilization into at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130165138 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. | 06-27-2013 |
20130165139 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a query from a radio-frequency identification object associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting a query from a radio-frequency identification object associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. | 06-27-2013 |
20130165140 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. | 06-27-2013 |
20130165141 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a query from a radio-frequency identification object associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting a query from a radio-frequency identification object associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the query response from the radio-frequency identification object associated with the at least one mobile device. | 06-27-2013 |
20130165148 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a mobile device location query using digital signal processing and presenting an indication of location of the mobile device at least partially based on receiving the location query. Additionally, systems and methods are described relating to means for accepting a mobile device location query using digital signal processing and means for presenting an indication of location of the mobile device at least partially based on receiving the location query. | 06-27-2013 |
20130165158 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. | 06-27-2013 |
20130165159 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting a mobile device location query using digital signal processing and presenting an indication of location of the mobile device at least partially based on receiving the location query. Additionally, systems and methods are described relating to means for accepting a mobile device location query using digital signal processing and means for presenting an indication of location of the mobile device at least partially based on receiving the location query. | 06-27-2013 |
20130165160 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. | 06-27-2013 |
20130165161 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. | 06-27-2013 |
20130167207 | Network Acquired Behavioral Fingerprint for Authentication - A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of the computing device, the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device. In addition to the foregoing, other example aspects are presented in the claims, drawings, and written description forming a part of the present disclosure. | 06-27-2013 |
20130172004 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. | 07-04-2013 |
20130191887 | Social network based trust verification Schema - A computationally implemented method includes, but is not limited to: for receiving at a computing device one or more behavioral fingerprints associated with one or more network accessible users; receiving an authentication request at the computing device, the authentication request associated with one or more proposed transactions of the one or more network accessible users; and transmitting from the computing device a decision associated with the authentication request, the decision based on a trust verification schema generated by relationally mapping the one or more behavioral fingerprints associated with the one or more network accessible users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 07-25-2013 |
20130197968 | BEHAVIORAL FINGERPRINTING WITH RETAIL MONITORING - Disclosed herein are example embodiments for behavioral fingerprinting with retail monitoring. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 08-01-2013 |
20130268756 | COMPUTATIONAL SYSTEMS AND METHODS FOR ANONYMIZED STORAGE OF DOUBLE-ENCRYPTED DATA - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash. | 10-10-2013 |
20130268773 | COMPUTATIONAL SYSTEMS AND METHODS FOR PREPARING DATA FOR DOUBLE-ENCRYPTION AND ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity. | 10-10-2013 |
20130287204 | COMPUTATIONAL SYSTEMS AND METHODS FOR DOUBLE-ENCRYPTING DATA FOR SUBSEQUENT ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-one encrypted data including at least one associated encrypted identifier; encrypting with a level-two encryption key at least a part of the level-one encrypted data to produce level-two encrypted data; receiving a hash of the at least one associated encrypted identifier; associating the hash with the level-two encrypted data; and transmitting the level-two encrypted data and associated hash of the at least one associated encrypted identifier. | 10-31-2013 |
20130290700 | COMPUTATIONAL SYSTEMS AND METHODS FOR ENCRYPTING DATA FOR ANONYMOUS STORAGE - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting from a user identifier encryption entity at least one encrypted identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one instance of data to produce level-one-encrypted data; associating the at least one encrypted identifier with the level-one-encrypted data, wherein a level-one decryption key for the level-one-encrypted data is inaccessible to the user identifier encryption entity; and transmitting the level-one-encrypted data and associated encrypted identifier. | 10-31-2013 |
20130303195 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of a traveled path of at least one mobile device over a specified time period; determining, using a microprocessor, a predicted location of the at least one mobile device at least partly based on receiving the indication of the traveled path over a specified time period; and presenting an indication of the predicted location of the at least one mobile device at least partially based on accepting an indication of a traveled path and determining a predicted location of the at least one mobile device. | 11-14-2013 |
20140040989 | MULTI-DEVICE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint. | 02-06-2014 |
20140123249 | Behavioral Fingerprinting Via Corroborative User Device - Disclosed herein are example embodiments for behavioral fingerprinting via corroborative user device. For certain example embodiments, one or more devices may (i) ascertain at least one indicator of a proximity of at least one corroborative user device that is affiliated with a behavioral fingerprint and (ii) incorporate the at least one indicator of a proximity of the at least one corroborative user device into an authentication-related analysis for a user device that is associated with the behavioral fingerprint. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 05-01-2014 |
20140123253 | Behavioral Fingerprinting Via Inferred Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-01-2014 |
20140175876 | Ad Hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: generating electrical power from at least one ambient source via at least one structurally integrated electromagnetic transducer; powering at least one transmitter via the electrical power to wirelessly transmit one or more sensor operation activation signals to one or more sensors; and at least one of powering one or more sensing operations of one or more sensors via the electrical power or charging one or more power storage devices electrically coupled to the one or more sensors via the electrical power. | 06-26-2014 |
20140176061 | Ad-hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: generating electrical power from at least one ambient source via at least one transducer; powering at least one transmitter via the electrical power from at least one ambient source to wirelessly transmit one or more sensor operation activation signals to one or more sensors; and at least one of powering one or more sensing operations of the one or more sensors or charging one or more power storage devices of the one or more sensors via the one or more sensor operation activation signals. | 06-26-2014 |
20140176343 | Ad-hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: obtaining location data associated with a portion of a region including at least one sensor; wirelessly transmitting one or more sensor operation activation signals to one or more sensors; and powering one or more sensing operations of a sensor via the one or more sensor operation activation signals. | 06-26-2014 |
20140177524 | Ad-Hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving one or more wireless signals associated with a sensing capability status of at least one sensor; wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to the sensing capability status of the at least one sensor; and at least one of powering one or more sensing operations of the at least one sensor and charging one or more power storage devices of the at least one sensor via the one or more sensor operation activation signals. | 06-26-2014 |
20140180628 | Ad-hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving one or more wireless signals indicative of a presence of a sensor within a portion of a region to be monitored; storing location data associated with the portion of the region to be monitored; and wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to the location data. | 06-26-2014 |
20140180630 | Ad-hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: receiving electrical power via at least one structurally integrated electrically conductive element; and powering one or more sensing operations of one or more sensors via the electrical power. | 06-26-2014 |
20140180639 | Ad-hoc Wireless Sensor Package - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for control of transmission to a target device with communicating with one or more sensors in an ad-hoc sensor network may implement operations including, but not limited to: wirelessly transmitting one or more sensor operation activation signals to one or more sensors according to one or more transmission authorization parameters; and powering one or more sensing operations of a sensor via the one or more sensor operation activation signals. | 06-26-2014 |
20140267176 | SYSTEMS AND METHODS FOR PARALLAX COMPENSATION - An electronic device may include a touch screen electronic display configured to offset and/or shift the contact locations of touch implements and/or displayed content based on one or more calculated parallax values. The parallax values may be associated with the viewing angle of an operator relative to the display of the electronic device. In various embodiments, the parallax value(s) may be calculated using three-dimensional location sensors, an angle of inclination of a touch implement, and/or one or more displayed calibration objects. Parallax values may be utilized to remap contact locations by a touch implement, shift and/or offset displayed content, and/or perform other transformations as described herein. A stereoscopically displayed content may be offset such that a default display plane is coplanar with a touch surface rather than a display surface. Contacts by a finger may be remapped using portions of the contact region and/or a centroid of the contact region. | 09-18-2014 |
20140267177 | SYSTEMS AND METHODS FOR PARALLAX COMPENSATION - An electronic device may include a touch screen electronic display configured to offset and/or shift the contact locations of touch implements and/or displayed content based on one or more calculated parallax values. The parallax values may be associated with the viewing angle of an operator relative to the display of the electronic device. In various embodiments, the parallax value(s) may be calculated using three-dimensional location sensors, an angle of inclination of a touch implement, and/or one or more displayed calibration objects. Parallax values may be utilized to remap contact locations by a touch implement, shift and/or offset displayed content, and/or perform other transformations as described herein. A stereoscopically displayed content may be offset such that a default display plane is coplanar with a touch surface rather than a display surface. Contacts by a finger may be remapped using portions of the contact region and/or a centroid of the contact region. | 09-18-2014 |
20140267178 | SYSTEMS AND METHODS FOR PARALLAX COMPENSATION - An electronic device may include a touch screen electronic display configured to offset and/or shift the contact locations of touch implements and/or displayed content based on one or more calculated parallax values. The parallax values may be associated with the viewing angle of an operator relative to the display of the electronic device. In various embodiments, the parallax value(s) may be calculated using three-dimensional location sensors, an angle of inclination of a touch implement, and/or one or more displayed calibration objects. Parallax values may be utilized to remap contact locations by a touch implement, shift and/or offset displayed content, and/or perform other transformations as described herein. A stereoscopically displayed content may be offset such that a default display plane is coplanar with a touch surface rather than a display surface. Contacts by a finger may be remapped using portions of the contact region and/or a centroid of the contact region. | 09-18-2014 |
20140267179 | SYSTEMS AND METHODS FOR PARALLAX COMPENSATION - An electronic device may include a touch screen electronic display configured to offset and/or shift the contact locations of touch implements and/or displayed content based on one or more calculated parallax values. The parallax values may be associated with the viewing angle of an operator relative to the display of the electronic device. In various embodiments, the parallax value(s) may be calculated using three-dimensional location sensors, an angle of inclination of a touch implement, and/or one or more displayed calibration objects. Parallax values may be utilized to remap contact locations by a touch implement, shift and/or offset displayed content, and/or perform other transformations as described herein. A stereoscopically displayed content may be offset such that a default display plane is coplanar with a touch surface rather than a display surface. Contacts by a finger may be remapped using portions of the contact region and/or a centroid of the contact region. | 09-18-2014 |
20140267184 | Multimode Stylus - A stylus for use as an input device automatically switches its mode of operation. | 09-18-2014 |