Patent application number | Description | Published |
20090019542 | METHOD AND SYSTEM FOR INTELLIGENT ROUNTING BASED ON PRESENCE DETECTION - A message, which is to be routed to one of a plurality of authorized parties comprising a first authorized party and a second authorized party, is received by a routing system. A Web service is polled to detect for a presence of the first authorized party. After determining that the presence of the first authorized party remains undetected over an allocated time interval, the Web service is polled to detect for a presence of the second authorized party. In response to detecting the presence of the second authorized party, the message is routed to an active communication device associated with the second authorized party. | 01-15-2009 |
20090136009 | Knowledge Management, Capture and Modeling Tool for Multi-Modal Communications - Systems and method of capturing multi-modal communications are provided. A particular method includes detecting a first communication made using a first communication device in a group of communication devices of a user, where the group of communication devices is defined by the user. The method also includes generating a first entry in an aggregated list of communications based on the first communication. The first entry includes information identifying the first communication device. | 05-28-2009 |
20100041374 | METHOD AND SYSTEM FOR MULTIMODAL PRESENCE DETECTION - Methods and systems for operating a communication module is disclosed. Generally, a fingerprint authentication device coupled with a communication module biometrically authenticates a user. The communication module sends an indication that the communication module is active for the user to receive a message based on the biometric authentication of the user. The communication module receives a message for the user that has been routed to the communication module based on the indication that the communication module is active for the user to receive a message. | 02-18-2010 |
20110072497 | SYSTEM AND METHOD OF USING PERSONAL DATA - A particular method includes receiving a request for a portion of user data from a data repository. The user data is associated with a user. The method includes determining a source of the request. The method includes determining whether the portion of user data can be provided to the source. The method also includes determining at least one type of credential to be supplied from the source when the user data can be provided to the source. The at least one type of credential includes a first authentication when the source is associated with the user and a second authentication when the source is not associated with the user. | 03-24-2011 |
20130084831 | Methods of Using Biometric Data in a Phone System and Apparatuses to Perform the Methods - A system includes a processor and a memory accessible to the processor. The memory includes instructions that, when executed by the processor, cause the processor to perform operations including, in response to an activation event, sending information to a biometric input device to activate the biometric input device. The operations further include receiving biometric data corresponding to a particular user from the biometric input device. The operations include determining whether an identification of the particular user matches the biometric data. In response to determining that the identification of the particular user matches the biometric data, a service is provided to a device associated with the particular user. | 04-04-2013 |
20140013113 | SECURE NON-INVASIVE METHOD AND SYSTEM FOR DISTRIBUTION OF DIGITAL ASSETS - A client computer system receives a file that is at least partially encrypted. The client computer also receives a file manager and user input. In response to the user input matching data stored in an encrypted user profile, the client computer uses the file manager to decrypt the file based on a key stored in the encrypted user profile. The file is unusable if copied to another client computer, and the file manager manages usage of the file based on one or more terms of usage. | 01-09-2014 |