Patent application number | Description | Published |
20080270281 | METHOD, SYSTEM, AND APPARATUS FOR DYNAMICALLY CREATING ELECTRONIC CONTRACTS - A method of dynamically negotiating a transaction can include determining a potential transaction between participants according to transaction parameters stored within a transaction parameter data store. The transaction parameters can be associated with each of the participants and can specify acceptable transaction terms. The potential transactions can be evaluated according to a mutual benefit conferred on the participants by the potential transactions according to the transaction parameters. The potential transactions can be ordered according to decreasing mutual benefit; and, the potential transaction having the greatest mutual benefit can be presented to the participants. | 10-30-2008 |
20090125600 | E-MAIL ROLE TEMPLATES FOR CLASSIFYING E-MAIL - An e-mail categorization system can include a plurality of role templates, each role template being associated with an e-mail account and defining a plurality of categories for categorizing e-mail messages. An authorized account holder can establish the plurality of categories and can designate programmatic actions that are to be selectively executed by an e-mail receiving application upon the receipt of e-mail messages. The selection of actions can be based upon categories of the received e-mail messages. Role templates can be distributed to e-mail originators so that when e-mail originators direct e-mail messages to an account associated with a role template, the originators are prompted to select one of the categories defined by a corresponding role template. | 05-14-2009 |
20090135742 | METHOD AND APPARATUS FOR NEGOTIATED MESSAGE DELIVERY - A method of message delivery can include registering a plurality of reception states for a receiving party. The reception states can specify conditions for establishing communications links with receiving party addresses. A receiving party address can be identified from a first initiated communications link between the sending party and the receiving party. Reception state data specified by the plurality of reception states can be determined according to the receiving party address and can be presented to the sending party. | 05-28-2009 |
20100125599 | OBTAINING TRUSTED RECOMMENDATIONS THROUGH DISCOVERY OF COMMON CONTACTS IN CONTACT LISTS - The present invention discloses a solution for obtaining trusted recommendations through discovery of common contacts in contact lists. The solution can utilize private contact lists (e.g., address book, phone lists) to permit users to search for and obtain trusted recommendations for a product and/or service. The presence of a contact in a contact list is recognized as recommendation of that contact. Recommendations can be determined through searching private contact lists and obtaining implicit relationships based on common contacts of multiple contact lists. Searches can be customized allowing recommendations to reflect results with high probability of confidence. Recommendations can also be affected by the degrees of separation between contact lists, professional peer relationships, expertise of contact list owner, and the like. Recommendation results can provide trusted recommendations for products and/or services without relying on potentially erroneous input. | 05-20-2010 |
20100222084 | URGENT COMMUNICATIONS THAT OVERCOME RECEIVING DEVICE IMPEDIMENTS - A communication attempt directed towards a recipient device can be identified. At least one proximate device geographically proximate to the recipient device can be automatically detected. Responsive to the determining of the proximate devices, a digitally encoded message can be wirelessly conveyed to one or more of the determined proximate devices. In various embodiments the message can be a text message, an instant message, and/or a voice message. The digitally encoded message can direct a user of the proximate device to inform a user of the recipient device of the communication attempt. | 09-02-2010 |
20100262572 | INCORPORATING REPRESENTATIONAL AUTHENTICITY INTO VIRTUAL WORLD INTERACTIONS - A system that incorporates representational authenticity into virtual world interactions can include user representational authenticity data and a virtual world computing system. The user representational authenticity data can be used to describe the physical characteristics of a human user. The physical characteristics can be quantified utilizing standardized measurement techniques. The virtual world computing system can be configured to adjudicate the conduction of interactions performed by a virtual representation of the human user within the virtual world environment utilizing the user representational authenticity data. | 10-14-2010 |
20120331400 | AUTHENTICATION SCORE QUANTIFING SIMILARITY BETWEEN A USER'S ONLINE PERSONA VERSUS THAT USER'S PHYSICAL CHARACTERISTICS - A visual representation of a human user for display within one or more graphical user interfaces to others interacting with the human user over a network can be identified. An authenticity score defining a degree of resemblance between the visual representation of the human user and physical characteristics of the human user can be calculated. | 12-27-2012 |
20130012175 | COMMUNICATING MESSAGES TO PROXIMATE DEVICES ON A CONTACT LIST RESPONSIVE TO AN UNSUCCESSFUL CALL - An unsuccessful communication attempt to a mobile receiving device is detected. A contact list associated with the mobile receiving device is accessed. One or more proximate devices to the mobile recipient device are determined. Each of the one or more proximate devices are communication devices of a contact of the contact list. A digitally encoded message is conveyed to at least one of the one or more proximate devices. The digitally encoded message indicates that a communication attempt with the mobile receiving device was unsuccessful and requests a recipient of the digitally encoded message inform a holder of the mobile receiving device of the unsuccessful communication attempt. | 01-10-2013 |
20130185624 | PROVIDING DIRECT MANIPULATION OF AN ANALYTICS DATA VISUALIZATION WITHIN AN ANALYTICS REPORT - A direct manipulation event associated with a chart of an analytics report can be detected. The event can be a user interface input and the chart can be an information graphic. The graphic can be a graphically rendered HTML compliant element and a data set. The report can conform to a JAVASCRIPT OBJECT NOTATION (JSON) format. The analytics report can be presented within a browser. An action can be run responsive to the detecting. The action can be an immediate rendering of the graphic based on the event. When the action executes a request for data not in the data set data from a different data set can be obtained. When the action executes a request for data in the data set, the data from the data set can be automatically retrieved. The analytics data can be immediately rendered as a chart within the canvas element of an HTML document. | 07-18-2013 |
20140280390 | ENABLING NTELLIGENT MEDIA NAMING AND ICON GENERATION UTILIZING SEMANTIC METADATA - A set of media files are identified within a data store. Each of the media files lack user established file names, lack user established icons, or lack user established file names and icons. The media files are analyzed to determine semantic metadata. For at least a subset of the media files, the semantic metadata is utilized to automatically generate unique and meaningful file names, file icons, or both file names and file icons for each of the media files in the subset. | 09-18-2014 |