Patent application number | Description | Published |
20090100358 | Summarizing Portlet Usage in a Portal Page - A portal summary controller stores detected usage of at least one instance of at least one portlet application within at least one portal page at each of a plurality of different times. Responsive to a trigger to generate a summary portal page, the portal summary controller dynamically creates a summary portal page displaying a separate instance of the at least one portlet application for at least one of each of the plurality of different times specified according to the separate usage stored at each of the plurality of different times, such that the summary portal page provides a summary of at least a selection of previous usage of the at least one portal page. The trigger to generate a summary portal page includes a user selecting which previous stored portal usage, including usage of individual portlet applications, to summarize in the summary portal page, such that the summary portal page renders a summary of only that content selected by the user. | 04-16-2009 |
20090100372 | Summarizing Portlet Usage Captured Responsive to Trigger Events in a Portal Page - A portal summary controller monitors usage metadata indicating current usage of at least one portlet within at least one portal page for one of multiple events specified to trigger storage of the usage metadata. Responsive to detecting one of the multiple events within the usage metadata which triggers storage, the portal summary controller stores the detected usage metadata at a current time of at least one instance of at least one portlet application within the at least one portal page. Subsequent to storing separate detected usage metadata at multiple different times, the portal summary controller dynamically creates a summary portal page displaying a separate instance of the at least one portlet application for at least one of each of the multiple different times specified according to the separate usage metadata stored at each of the multiple different times, such that the summary portal page provides a summary of at least a selection of previous usage metadata selected by a user of the at least one portal page based on usage metadata stored responsive to trigger events. | 04-16-2009 |
20090279677 | METHOD AND SYSTEM TO PREVENT UNINTENDED USERS FROM ACCESSING A RE-ROUTED COMMUNICATION - A method, system, and computer-readable medium embodying a computer program for securing a communication against access by unintended users is presented. A communication is initiated from a person using an originating telecommunication device to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a telecommunications host carrier provider may re-route the communication to an alternate telecommunication device. A business authentication logic of the host carrier then determines any security or quality of service filters established by the user of the originating telecommunication device prior to the communication being initiated to prevent unintended users from accessing the communication. Upon the business authentication logic of the host carrier authorizing the communication, the communication is encrypted and re-routed to the alternate telecommunication device. Upon receipt, the user of the alternate telecommunication device may then decrypt and access the secured communication. | 11-12-2009 |
20090279680 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL BASED ON MUTUAL CONTACTS OF A CONTACT LIST - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, scan of other alternate telecommunication devices is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If an alternate telecommunication device is available to receive the communication, then the communication is rerouted to the preferred alternate telecommunication device based on the alternate telecommunication device being a mutual contact of the contact list of the caller telecommunication device and the mapping profile of the intended receiving telecommunication device. | 11-12-2009 |
20090280785 | METHOD AND SYSTEM FOR PERFORMING PROXIMITY BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device. | 11-12-2009 |
20090280787 | METHOD AND SYSTEM FOR PERFORMING ROUTING OF A PHONE CALL THROUGH A THIRD PARTY DEVICE - A method, system, and computer program for routing an outgoing communication in real time is presented. A communication is received from a caller to an intended receiving wireless telecommunication device. In response to the communication failing to connect to the intended receiving wireless telecommunication device, a host carrier initiated query of third party priority of contacts routing preferences of the intended receiving wireless telecommunication device is initiated to determine if other communication devices are available for receiving a re-route of the original communication. If third party routing preferences of the intended receiving wireless telecommunication device have previously been established, then the call is rerouted through one or more alternate telecommunication devices to the intended receiving wireless telecommunication device. The priority of contacts is stored with the host carrier. | 11-12-2009 |
20090280817 | METHOD AND SYSTEM FOR PERFORMING RECIPIENT BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an incoming voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a short range wireless query signal is transmitted to determine if another wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from the other wireless telecommunication device indicating that the other wireless telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the other wireless telecommunication device based on preferences internal to the intended receiving wireless device. These preferences may be stored on the intended receiving wireless device or remotely stored on the host carrier network. | 11-12-2009 |
20090280818 | METHOD AND SYSTEM FOR PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A method, system, and computer program for routing an outgoing voice call in real time is presented. A call is received from a caller to an intended receiving wireless telecommunication device. In response to the call failing to connect to the intended receiving wireless telecommunication device, a caller initiated short range wireless query signal is transmitted to determine if an other wireless communication device is within a predefined proximity to the intended receiving wireless telecommunication device. If the intended receiving wireless telecommunication device receives a response from an other proximate telecommunication device indicating that the proximate telecommunication device is within the predefined proximity to the intended receiving wireless telecommunication device, then the call is rerouted to the proximate telecommunication device based on preferences internal to the caller telecommunication device. These preferences may be stored on the caller telecommunication device or remotely stored on the host carrier network. | 11-12-2009 |
20110010258 | File Fragment Pricing in a Segmented File Sharing Network - A mechanism is provided for file fragment pricing in a segmented file sharing system. The mechanism allows peers to set a price for distributing a file through the file sharing system. A peer then becomes a file distributor on behalf of an original file provider. The original file provider may compensate the file distributor based on a compensation agreement. The peer's client may be configured to download file fragments from file distributors, or the original file provider, based on preferences, such as price, peer rating, upload speed, or similarity. As a result, a peer may download a file for a price that is less than the original price from the original file provider. Thus, the mechanism provides an incentive for peers to participate in file sharing, which results in larger swarms. | 01-13-2011 |
20110010421 | List Passing in a Background File Sharing Network - A mechanism is provided for distributing file fragments in the background of a segmented peer-to-peer network using list passing between peers. Rather than trading actual content, peers may trade file names or file fragment identifiers. Upon receiving a new file name or identifier, a peer may request that file from the network, either in the background or the foreground. For example, once a client begins background file sharing in a swarm, the client may propagate file information for files it possesses to all or a portion of the peers in a swarm. Those clients then have the file information for a file without the user having to locate and specifically request that file. The file list may piggyback on a file fragment that is transferred as a result of a file sharing request. | 01-13-2011 |
20110023019 | Monitoring File Access of Java Processes - A mechanism for monitoring file accesses by a process running in a Virtual Machine. File access information associated with a monitored process selected in a first view in a debugging interface is obtained from a file activity log and displayed as selectable file access events in a second view of the debugging interface, wherein each file access event represents a read or write operation performed on a file at a particular point in time by the monitoring process. An initial content of a file associated with the selected file access event and revisions made to the file by the monitored process within a defined period of time is retrieved from the file activity log upon detecting user selection of a file access event in the second view. The revisions are applied to the initial content of the file and displayed in a third view in the debugging interface. | 01-27-2011 |
20110055193 | Applying User-Generated Deployment Events to a Grouping of Deployable Portlets - A mechanism is provided for applying individual user-generated deployment events to a grouping of bookmarked deployable Web archive files. The mechanism allows a user of a bookmarking service for deployable Web archive files to group bookmarked Web archive files according to criteria, such as tag names, and to perform actions, such as a deploy action, to all members of the group in a single user-generated event. The mechanism allows a user to perform a search of portlets meeting specified criteria. The user may then select portlets from the result set for deployment as a group. The mechanism also allows a user of the bookmarking service to tag pre-configured portlet groupings, or portal tabs. Users may choose to deploy not just a tagged portlet, but an entire tab of portlets in a single deployment action. The mechanism may also allow a user to deploy a collection of portal tabs. | 03-03-2011 |
20110106835 | User-Defined Profile Tags, Rules, and Recommendations for Portal - A mechanism is provided for providing control over personalization of portal content. The mechanisms provide new tag types and management of these tags to be used in association with a portal application. Applications of the new tag types comprise filtering of new content in the form of recommendations or search results and filtering of accessed content in the form of session summaries. Users may specify user context or state via one or more profile tags or enhanced profile attributes. Users may generate new rules for displayed portlets or portlet recommendation lists. User defined rules may be based on existing available rule-building capabilities and user-defined context tags or enhanced profile attributes and private or public portlet or portal page tags. The portal summary service may configure generation of portal session summary data according to user-defined context, portlet or portal tags, and rules. | 05-05-2011 |
20110131501 | SUMMARIZING PORTLET USAGE CAPTURED RESPONSIVE TO TRIGGER EVENTS IN A PORTAL PAGE - A portal summary controller monitors usage metadata indicating current usage of at least one portlet within at least one portal page for one of multiple events specified to trigger storage of the usage metadata. Responsive to detecting one of the multiple events within the usage metadata which triggers storage, the portal summary controller stores the detected usage metadata at a current time of at least one instance of at least one portlet application within the at least one portal page. Subsequent to storing separate detected usage metadata at multiple different times, the portal summary controller dynamically creates a summary portal page displaying a separate instance of the at least one portlet application for at least one of each of the multiple different times specified according to the separate usage metadata stored at each of the multiple different times, such that the summary portal page provides a summary of at least a selection of previous usage metadata selected by a user of the at least one portal page based on usage metadata stored responsive to trigger events. | 06-02-2011 |
20120003931 | Method for Dynamic Changes to a User Profile Based on External Service Integration - The different illustrative embodiments provide a method, system, and program product for dynamic changes to a user profile based on external service integration. The method, system and program product comprise establishing a direct two-way communication between a first mobile device and a second mobile device when a first mobile device direct transceiver and a second mobile device direct transceiver are within a range of each other. A number of data is gathered from a number of internal sources or a number of external sources. An analysis of the number of data to determine a modification to a first list stored in the first device is performed. A modified first list is generated based on the analysis. The modified first list is automatically sent from the first mobile device to the number of second devices responsive to establishing the direct two-way communication between the first mobile device and a number of second devices. | 01-05-2012 |
20120003965 | Method for Information Sharing After Proximity Connection Has Ended - The different illustrative embodiments provide a method, system, and computer program product for sharing a list passed in a shared direct communication environment after a direct communication has ended among mobile devices. A profile associated with the first mobile device in a storage of a server computer is accessed by an indirect transceiver in the second mobile device responsive to a second mobile device acquiring an information that is responsive to a list previously received from a first mobile device and responsive to the information being acquired during a time when there is no direct communication between the first mobile device and the second mobile device. A contact information is retrieved, and the information is sent to a location specified by the contact information. | 01-05-2012 |
20120004954 | Crowd-Sourced Shopping List Augmentation - A method for receiving shopping recommendations is provided. In response to adding, by a client device, an item to a current shopping list of a customer, the client device sends the current shopping list with the added item to a server device for a shopping recommendation. In response to receiving, from the server device, a recommendation for a new item not found in the current shopping list of the customer, the client device displays the recommendation for the new item in the current shopping list of the customer. It is also determined whether a purchase incentive is associated with the new item recommended by the server device. In response to determining that a purchase incentive is associated with the new item recommended by the server device, the client device displays the purchase incentive with the new item recommended by the server in the current shopping list of the customer. | 01-05-2012 |
20120136966 | Background File Sharing in a Segmented Peer-to-Peer Sharing Network - A peer-to-peer file sharing client with background file sharing is provided in a segmented peer-to-peer file sharing network. Each file sharing participant may designate an amount of bandwidth and/or storage space for background file sharing. Peer-to-peer file sharing clients then share file data and content in the background automatically. The client may participate in additional swarms, in the background, to generally increase the number of peers in file sharing networks, thus increasing the speed of downloading desired files for other users. | 05-31-2012 |
20120143596 | Voice Communication Management - A method, a computer program product, and an apparatus for managing a voice communication are provided. In one illustrative embodiment, an audio phrase produced by a first user is identified in the voice communication between the first user and a second user. A determination is made whether the audio phrase is present in a policy which prohibits the transmission of the set of undesired audio phrases. Responsive to a determination that the audio phrase is present in the policy which prohibits the transmission of the set of undesired audio phrases, a communication of the audio phrase is modified. | 06-07-2012 |
20120143728 | Managing Transmission of Information - A method, a computer program product, and an apparatus for managing transmission of information are provided. A determination is made as to whether a pattern in a set of patterns is present in the information to be transmitted by a first user. Responsive to a determination that the pattern in the set of patterns is present in the information to be transmitted, the information is inhibited from being transmitted by the first user. A request is sent to a mobile device of a second user for an approval of the information to be transmitted. Responsive to receiving the approval of the information to be transmitted from the second user, the information is transmitted. | 06-07-2012 |
20120204121 | SUMMARIZING PORTLET USAGE IN A PORTAL PAGE - A portal summary controller stores detected usage of at least one instance of at least one portlet application within at least one portal page at each of a plurality of different times. The portal summary controller dynamically creates a summary portal page displaying a separate instance of the at least one portlet application for at least one of each of the plurality of different times specified according to the detected usage separately stored at each of the plurality of different times, wherein the summary portal page provides a summary of at least a selection of a previous usage of the at least one portal page comprising each separate instance of the at least one portlet application that functions as if placed on the at least one portal page. | 08-09-2012 |
20130023273 | PERFORMING CALLER BASED ROUTING OF A PHONE CALL - A caller telecommunication device transmits a call to an intended receiving wireless telecommunication device. In response, the caller telecommunication device transmits an instruction to a first proximate telecommunication device, wherein the instruction directs the first proximate telecommunication device to determine if the first proximate telecommunication device is within a predefined proximity of the intended receiving wireless telecommunication device. The predefined proximity is a distance within which the intended receiving wireless telecommunication device and other wireless telecommunication device can directly communicate by local signals. The caller communication device re-routes the call to the first proximate telecommunication device if the first proximate telecommunication device is within the predefined proximity of the intended receiving wireless telecommunication device. | 01-24-2013 |
20130086001 | AUTOMATIC FILE VERSION VERIFICATION WITHIN ELECTRONIC MAIL - A method can include determining metadata for a file responsive to initiating an operation on the file stored within a client system and determining a storage location within a file repository of a master version of the file from the metadata. The method also can include determining, from the storage location, whether the master version of the file is more recent than the file stored within the client system using a processor of the client system. | 04-04-2013 |