Patent application number | Description | Published |
20080207220 | Methods, systems, and products for identity verification - Methods, systems, and products are disclosed for identification verification. Location information is acquired. The location information is compared to historical location information. When the location information favorably compares to the historical location information, then an identity associated with the location information is verified. | 08-28-2008 |
20080209543 | Methods, systems, and products for identity verification - Methods, systems, and products are disclosed for identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified. | 08-28-2008 |
20080242268 | Methods, Systems and Computer Program Products for Remotely Controlling Wireless Terminals - Wireless terminals are remotely controlled by identifying a wireless terminal that is located at a premises and obtaining at least one operational authorization rule for the wireless terminal that was identified, and that applies to the premises at which the wireless terminal is located. Selected operations of the wireless terminal are disabled and/or enabled in response to the at least one operational authorization rule that was obtained for the wireless terminal that was identified and that applies to the premises at which the wireless terminal is located. | 10-02-2008 |
20080288821 | Automated Diagnosis for Electronic Systems - Systems for providing automated diagnosis of problems for an electronic network include a central diagnosis engine configured to include modules that rank identified policy/configuration changes into potential causes, verify the ranked potential causes and determine whether any of the ranked potential causes is a likely cause or contributor to the problem. An estimator module is configured to calculate distances associated with the ranked potential causes such that a list of potential causes of the problem can be presented in order of likelihood. Other systems and methods are also provided. | 11-20-2008 |
20090004998 | METHODS, USER TERMINALS, COMPUTER PROGRAM PRODUCTS, AND COMPONENTS FOR PROVIDING COMMUNICATIONS IN EMERGENCY SITUATIONS - A method for providing communications services in a network can include adjusting a mode of communication for devices operating in the network based on emergency state information. Related user terminals, computer program products, and components are also disclosed. | 01-01-2009 |
20090031422 | METHODS AND SYSTEMS THAT SELECTIVELY RESURRECT BLOCKED COMMUNICATIONS BETWEEN DEVICES - Data communications between devices are selectively blocked and resurrected based on error notifications. Data communications from one or more source devices to one or more intended destination devices are selectively blocked based on content of the data communications. The blocked data communications are stored in a database. A blocked data communication is retrieved from the database in response to an error notification from one of the source devices and/or from one of the destination devices. The retrieved data communication is then sent to the intended destination device. | 01-29-2009 |
20090044277 | Non-invasive monitoring of the effectiveness of electronic security services - Systems for the non-invasive monitoring of the effectiveness of a customer's electronic security services include a test generation engine for generating and launching a denatured attack towards a customer's network. A monitoring and evaluation agent is operatively coupled to the test generation engine and is adapted to monitor and evaluate the denatured attack. A recording and analysis engine is adapted to record and analyze the results of the denatured attack. Other systems and methods are also provided. | 02-12-2009 |
20090060177 | SIGNATURE SPECIFICATION FOR ENCRYPTED PACKET STREAMS - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-05-2009 |
20090088070 | Methods, Systems, and Computer-Readable Media for Utilizing a Repeating Function to Improve Quality of Service - Methods, systems, and computer-readable media provide for utilizing a repeating function to improve quality of service. According to embodiments, a method for utilizing a repeating function to improve quality of service is provided. According to the method a first mobile cellular device is selected. An instruction is transmitted to the first mobile cellular device instructing the first mobile cellular device. The instruction causes the first mobile cellular device to relay communications between the second mobile cellular device and the cellular service provider. The first mobile cellular device thereby provides the repeating function for the second mobile cellular device. | 04-02-2009 |
20090088156 | Methods, Systems, and Computer-Readable Media for Reserving A Cellular Resource - Methods, systems, and computer-readable media provide for reserving a cellular resource. According to embodiments, a method for reserving a cellular resource is provided. According to the method, a change in location is determined for a preferred cellular device. Whether the preferred cellular device will be handed off from a first cell to a second cell is predicted based on the change in location for the preferred mobile cellular device. In response to predicting that the preferred cellular device will be handed off from the first cell to the second cell, a cellular resource in the second cell is reserved for the preferred cellular device. | 04-02-2009 |
20090088157 | Methods, Systems, and Computer-Readable Media for Providing Cellular Handoff - Methods, systems, and computer-readable media provide for providing cellular handoff. According to embodiments, a method for providing a cellular handoff is provided. According to the method, a first group of users is associated with a first class of service and a first cellular tower. A second group of users is associated with a second class of service. Whether to hand off the first group of users from the first cellular tower to a second cellular tower is determined based on real-time quality of service provided to at least one of the first group of users and the second group of users. In response to determining to hand off the first group of users from the first cellular tower to the second cellular tower, a handoff of the first group of users from the first cellular tower to the second cellular tower is performed. | 04-02-2009 |
20090088169 | Methods, Systems, and Computer-Readable Media for Providing Multiple Communication Paths - Methods, systems, and computer-readable media provide for providing multiple communication paths. According to embodiments, a method for providing multiple communication paths is provided. According to the method, a plurality of cellular towers within a given range from a cellular device is determined. A first quality rating is determined for each of the plurality of cellular towers. A first group of cellular towers is selected from the plurality of cellular towers based on the first quality rating. A first plurality of communication paths is established between the cellular device and the first group of cellular towers. Each of the first plurality of communication paths may correspond to one of the cellular towers in the first group. At least one quality factor associated with each of the first plurality of communication paths is adjusted based on the first quality rating. | 04-02-2009 |
20090088170 | Methods, Systems, and Computer-Readable Media for Adapting A Quality of Service Mechanism Based on Feedback - Methods, systems, and computer-readable media provide for adapting a quality of service mechanism based on feedback. A condition that affects quality of service of a communications network is monitored. An adaptation of the quality of service mechanism is determined based on a change to the condition. The adaptation is implemented on the communications network to improve the quality of service. | 04-02-2009 |
20090131067 | Methods, Systems, and Computer-Readable Media for Mitigating a Temporary Interference Condition - Methods, systems, and computer-readable media for mitigating a temporary interference condition are provided. The temporary interference condition is predicted between a first cellular device and a second cellular device prior to an occurrence of the temporary interference condition. A mitigation action for mitigating the temporary interference condition is identified. A schedule and a scale or scaling for the mitigation action are determined. The mitigation action is implemented in accordance with the schedule and the scale or scaling to mitigate the temporary interference condition during the occurrence of the temporary interference condition. | 05-21-2009 |
20090156177 | Reducing Bandwidth When Transmitting Content to a Cellular Device - Bandwidth is reduced when transmitting content to a cellular device. Requests for a content item are received from a first cellular device and a second cellular device. The content is divided into a first portion and a second portion. A first portion plan corresponding to the first cellular device and second portion plan corresponding to the second cellular device are determined. The first portion plan may include instructions for transmitting the first portion from the first cellular device to the second cellular device and reconstructing the content item. The second portion plan may include instructions for transmitting the second portion from the second cellular device to the first cellular device and reconstructing the content item. The first portion and the first portion plan are transmitted to the first cellular device. The second portion and the second portion plan are transmitted to the second cellular device. | 06-18-2009 |
20090172813 | Non-Invasive Monitoring of the Effectiveness of Electronic Security Services - Systems for the non-invasive monitoring of the effectiveness of a customer's electronic security services include a test generation engine for generating and launching a denatured attack towards a customer's network. A monitoring and evaluation agent is operatively coupled to the test generation engine and is adapted to monitor and evaluate the denatured attack. A recording and analysis engine is adapted to record and analyze the results of the denatured attack. Other systems and methods are also provided. | 07-02-2009 |
20090197585 | Quality of Service for Grouped Cellular Devices - Embodiments described herein provide for improving quality of service in a cellular network. A group of cellular devices is identified. Quality of service mechanisms are identified. A quality of service plan for coordinating an execution of quality of service mechanisms by the group is determined. The quality of service mechanisms are applied to the group of cellular devices in accordance with the quality of service plan. | 08-06-2009 |
20090197614 | Content Forwarding for Bandwidth Conservation - Embodiments described herein provide for conserving bandwidth. A cluster of cellular devices is identified. Each cellular device in the cluster may be within a given proximity from at least one other cellular device in the cluster. A seed is selected from the cluster of cellular devices. A schedule associated with a content item to be distributed to the cluster of cellular devices is identified. The schedule identifies which of the cellular devices in the cluster receive the content item. A cellular tower is instructed to transmit the content item and the schedule to the seed. Upon receiving the content item, the seed may forward the content item to another cellular device in the cluster according to the schedule. | 08-06-2009 |
20090197628 | Reducing Co-Interference by Hushing Selective Cellular Devices - Embodiments described herein provide for reducing cellular co-interference. A primary cellular device is selected. A secondary cellular device that causes co-interference with the primary cellular device is also selected. Whether the primary cellular device is a transmitting device or a receiving device is determined. Upon determining that the primary cellular device is a transmitting device, a first hush command is transmitted to the primary cellular device. Upon determining that the primary cellular device is a receiving device, a second hush command is transmitted to the secondary cellular device. The first hush command instructs the primary cellular device to increase a first transmit power from the primary cellular device to a cellular tower. The second hush command instructs the secondary cellular device to decrease a second transmit power from the secondary cellular device to the cellular tower. | 08-06-2009 |
20090282269 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR DETECTING TAMPERING OF ELECTRONIC EQUIPMENT BASED ON CONSTRAINED TIME TO OBTAIN COMPUTATIONAL RESULT - Tampering of electronic equipment may be detected by instructing the electronic equipment to perform at least one computational operation at the electronic equipment, such as hashing of at least some of the memory of the electronic equipment, to produce a result. The result is received from the electronic equipment. Tampering of the electronic equipment is detected if the result is not received within a constrained time of the instructing, even if the result is correct. Tampering also may be detected if the result is not correct. | 11-12-2009 |
20090318131 | Managing Multiple Cellular Quality of Service Mechanisms - Identification information, static inputs, and dynamic inputs are obtained. A plurality of potential situations are identified. Further, each of the plurality of potential situations being mapped to one or more quality of service (QoS) mechanisms. Relevant QoS mechanisms are determined by matching the obtained identification information, static inputs, and dynamic inputs with relevant situations in the plurality of potential situations. Groups of the relevant QoS mechanisms are identified. For each of the groups of the relevant QoS mechanisms, parameters associated with an operation of each of the relevant QoS mechanisms is adjusted based on the obtained identification information, static inputs, and dynamic inputs. A predicted effectiveness is evaluated for at least one of the groups of relevant QoS mechanisms in accordance with the adjusted parameters. One of the groups of relevant QoS mechanisms is selected based on the predicted effectiveness and is implemented. | 12-24-2009 |
20100063884 | Methods, Systems and Computer Program Products for Monitoring Service Usage - Monitoring criteria is received that corresponds to a usage quantity for a plurality of services. Each of the plurality of services is provided over ones of a plurality of different communication systems. Actual service usage information is received for the plurality of services. The actual service usage information and the monitoring criteria are compared. An electronic notification message is sent when the monitoring criteria for one or more of the plurality of services is satisfied. | 03-11-2010 |
20100070601 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR OPERATING AN ELECTRONIC MAIL OR MESSAGING SYSTEM IN WHICH INFORMATION ASSOCIATED WITH AN ATTACHMENT IS SENT TO A DESTINATION FOR EVALUATION BEFORE SENDING THE ATTACHMENT - An electronic mail/messaging system is operated by compiling information associated with an attachment for an electronic mail at a source. The information includes initial information and descriptive information. The initial information is sent to a destination. A determination is made whether the destination has a file that matches the attachment based on the initial information. The attachment is sent to the destination if the destination does not have the file. The descriptive information is sent to the destination if the destination has the file. A determination is made whether the file matches the attachment based on the descriptive information. The attachment is sent to the destination if the file does not match the attachment based on the descriptive information. | 03-18-2010 |
20100232313 | DETECTION OF ENCRYPTED PACKET STREAMS USING FEEDBACK PROBING - Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets. | 09-16-2010 |
20100248643 | INTELLIGENT ADAPTIVE RE-CODING FOR IMPROVED COMMUNICATIONS RESOURCE UTILIZATION - System(s) and method(s) that, periodically or when dynamically triggered, adapt data rates associated with user equipment (UE) in a network are presented. When the UE uses an application or a service, data traffic associated with the UE is inspected to obtain information relating to the application or service, which is used to determine an application/service margin. Current and historical information relating to communication conditions associated with the UE and an associated user is obtained to facilitate determining expected values of Quality-of-Service factors and communication condition metrics associated with the UE and thereby a volatility margin. For each adaptation time interval, the data rate can be adapted by determining a preliminary data rate and adjusting the preliminary data rate using the application/service margin and volatility margin to obtain the adapted data rate to be used for data communications between a node and the UE in the network. | 09-30-2010 |
20100248763 | ADAPTIVE MULTI-TIERED RE-CODING FOR IMPROVED COMMUNICATIONS RESOURCE UTILIZATION - System(s) and method(s) that, periodically or when triggered, adapt data rates in multiple tiers of a network are presented. A top tier feedback (FB) loop adapts on a longer time scale associated with its longer path transit time for FB communication messages from a wireless portion to a data source in the wire-line portion of the network. A bottom tier FB loop adapts very quickly, and on a shorter time scale that the top tier FB loop due to its shorter FB path transit time, at the wireless edge with sufficient speed to accurately adapt to fast-changing wireless conditions. The top tier provides efficient resource utilization down to the bottom tier, and the bottom tier provides efficient resource utilization within the wireless portion of the network. A middle tier(s) can be added as desired to provide a more gradual stepped adaptation from source to destination. | 09-30-2010 |
20110023109 | Network Firewall Host Application Identification and Authentication - Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host computer, configured to identify each application in use, tag the application identity with a host identity, combine these and other information into a data packet, and securely transmit the data packet to the network based firewall. The embodiment also includes an application identity listener on the network based firewall, configured to receive the information data packet, decode the data packet and provide to the network based firewall the identity of the application. The network based firewall is provided with an application-awareness via an extension of firewall filtering or security policy rules via the addition of a new application identity parameter upon which filtering can be based. Other systems and methods are also provided. | 01-27-2011 |
20110035184 | Methods, Systems, and Products for Monitoring Athletic Performance - Methods, systems, and products monitor athletic performance. Location information is acquired that indicates a device is in movement. A level of difficulty associated with the location information is retrieved and associated to a distance traversed during the movement. The distance traversed and the level of difficulty are stored in a database. | 02-10-2011 |
20110090301 | METHOD AND APPARATUS FOR PROVIDING A COLLABORATIVE WORKPLACE - A method and apparatus for providing collaborative workspace are disclosed. The method receives a request to establish a video conference for two or more participants, and obtains information from historical information on the two or more participants to be used with the collaborative workspace. The method determines preferences for each of the two or more participants as to a presentation of the collaborative workspace. The method receives one or more live images of the two or more participants and presents the collaborative workspace to each of the two or more participants in accordance with the preferences for each of the two or more participants. | 04-21-2011 |
20110126294 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR CONTROLLING DISTRIBUTION OF DIGITAL CONTENT IN A FILE SHARING SYSTEM USING LICENSE-BASED VERIFICATION, ENCODED TAGGING, AND TIME-LIMITED FRAGMENT VALIDITY - A method for controlling distribution of digital content includes fragmenting a digital content file into fragments and tagging at least some of the fragments with corresponding tags to provide tagged fragments for distribution. The tags may be generated using a pseudo-random number (PRN) bit sequence. A digital rights license is generated for the digital content file based on the tags and/or fragments. The digital rights license is configured to allow reassembly of the tagged fragments to provide the digital content file. Later, the fragments may be re-tagged with corresponding second tags to provide second tagged fragments for distribution that are different from the first tagged fragments. Related systems and computer program products are also discussed. | 05-26-2011 |
20110320283 | Methods, Systems, and Products for Monitoring Service Usage - Usage information is received that describes usage of communication services by a communications device. The usage information is compared to monitoring criteria. When the monitoring criteria is satisfied, an electronic notification message is sent to the communications device. The electronic notification message when a communications service is initiated and before an additional charge for the communications service is incurred. | 12-29-2011 |
20120079588 | Methods, Systems, and Products for Identity Verification - Methods, systems, and products verify identity of a person identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified. | 03-29-2012 |
20120084861 | METHODS AND SYSTEMS THAT SELECTIVELY RESURRECT BLOCKED COMMUNICATIONS BETWEEN DEVICES - Data communications between devices are selectively blocked and resurrected based on error notifications. Data communications from one or more source devices to one or more intended destination devices are selectively blocked based on content of the data communications. The blocked data communications are stored in a database. A blocked data communication is retrieved from the database in response to an error notification from one of the source devices and/or from one of the destination devices. The retrieved data communication is then sent to the intended destination device. | 04-05-2012 |
20120110128 | METHODS, APPARATUS AND ARTICLES OF MANUFACTURE TO ROUTE POLICY REQUESTS - Example methods, apparatus and articles of manufacture to route policy requests are disclosed. A disclosed example method includes receiving, at a policy request router, a policy request from a policy requestor, applying, at the policy request router, a rule to a parameter representing a network condition to select a policy server for the policy request, and sending from the policy request router to the policy requestor an identifier representing the policy server, the policy requestor to send the policy request to the policy server based on the identifier, the policy server to enforce a policy associated with the policy request. | 05-03-2012 |
20120222138 | Methods, Systems & Products for Distributing Digital Content - Methods, systems, and products distribute digital content based on digital rights license. A digital file may be fragmented into a plurality of unusable fragments. Each unusable fragment is separately unusable. Each unusable fragment may be tagged with a tag to generate tagged unusable fragments. The digital rights license is generated based on the tag, such that the tagged unusable fragments may be reassembled into the digital file. | 08-30-2012 |
20120260331 | Network Firewall Host Application Identification and Authentication - Systems for providing information on network firewall host application identification and authentication include an identifying and transmitting agent on a host computer, configured to identify each application in use, tag the application identity with a host identity, combine these and other information into a data packet, and securely transmit the data packet to the network based firewall. The embodiment also includes an application identity listener on the network based firewall, configured to receive the information data packet, decode the data packet and provide to the network based firewall the identity of the application. The network based firewall is provided with an application-awareness via an extension of firewall filtering or security policy rules via the addition of a new application identity parameter upon which filtering can be based. Other systems and methods are also provided. | 10-11-2012 |
20120289148 | Methods, Systems, and Computer-Readable Media for Utilizing a Repeating Function to Improve Quality of Service - Methods, systems, and computer-readable media provide for utilizing a repeating function to improve quality of service. According to embodiments, a method for utilizing a repeating function to improve quality of service is provided. According to the method a first mobile cellular device is selected. An instruction is transmitted to the first mobile cellular device instructing the first mobile cellular device. The instruction causes the first mobile cellular device to relay communications between the second mobile cellular device and the cellular service provider. The first mobile cellular device thereby provides the repeating function for the second mobile cellular device. | 11-15-2012 |
20120317413 | DETECTION OF ENCRYPTED PACKET STREAMS USING A TIMER - Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. The type of data within an encrypted stream of packets is inferred using an observable parameter. The observable parameter is observable despite encryption obscuring the contents of the encrypted stream of packets. A timer is established that maintains settings despite changes in the type of inferred data. | 12-13-2012 |
20130010596 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROVIDING TRAFFIC CONTROL SERVICES - Traffic control services include detecting an occurrence of an activity via a computer processor. The activity subject to the detecting includes a presence of a device. The services also include obtaining traffic management support information associated with a source and destination of the activity. The traffic management support information includes user-defined preferences for controlling traffic to the device. The services further include determining whether the source and the destination supports traffic management activities, and if the source and the destination support the traffic management activities the computer processor subscribes to traffic messages provided by the source and implements traffic management activities for the source and the destination based upon the traffic messages and the user-defined preferences. If the source and the destination do not support the traffic management activities, the computer processor performs default traffic management activities. | 01-10-2013 |
20130054766 | Methods, Systems, and Products for Notifying of Enhancements to Quality of Service and Experience - Methods, systems, and products notify users when changes in a communication network improve quality of service. When a service provider changes a configuration parameter in the communications network, a change to the configuration parameter is compared to a rule. When the change to the configuration parameter results in a perceivable improvement in quality of service, a notification is sent to a user's device. The notification informs the user's device of the improvement in quality of service caused by the change to the configuration parameter. | 02-28-2013 |
20130055136 | Methods, Systems, and Products for Controlling Quality of Service and Experience - Methods, systems, and products allow users to optimize communications services. Network performance measurements are received that describe applications utilizing communications services from a communications network. The network performance measurements are displayed in a graphical user interface. When an icon in the graphical user interface is selected, the network performance measurements are displayed that are utilized by each application. | 02-28-2013 |
20130080786 | Signature Specification for Encrypted Packet Streams - Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents. | 03-28-2013 |
20130111590 | METHODS AND SYSTEMS THAT SELECTIVELY RESURRECT BLOCKED COMMUNICATIONS BETWEEN DEVICES | 05-02-2013 |
20130132264 | Bid-Based Control of Networks - Service by a packet switched network is controlled based on bids from consumer equipment. The bids may be compared to historical bids previously received from each of the consumer equipment. A low bid from one of the consumer equipment may be disregarded, based on a history of high bids. | 05-23-2013 |
20130160118 | Methods, Communication Networks, and Computer Program Products for Monitoring, Examining, and/or Blocking Traffic Associated with a Network Element Based on Whether the Network Element Can be Trusted - A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element. | 06-20-2013 |
20130167197 | Methods, Systems, and Computer Program Products for Invoking Trust-Controlled Services Via Application Programming Interfaces (APIs) Respectively Associated Therewith - A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function. | 06-27-2013 |
20130170379 | Detection of Encrypted Packet Streams Using Feedback Probing - Methods, systems, and devices are disclosed for detecting encrypted Internet Protocol packet streams. A probe stream having a known observable parameter is generated. The observable parameter exhibits a known characteristic of a known type of data encrypted within a stream of packets. The probe stream is communicated to a network element via a communications network. When the probe stream is received by the network element, the network element can compare the known observable parameter to an actual value. Any difference between the known observable parameter and the actual value can be used to correct for network-induced variation and other effects, thus ensuring accurate detection and identification of data types within encrypted streams of packets. | 07-04-2013 |
20130239025 | METHOD AND APPARATUS FOR PROVIDING A COLLABORATIVE WORKSPACE - A method and apparatus for providing collaborative workspace are disclosed. The method receives a request to establish a video conference for two or more participants, and obtains information from historical information on the two or more participants to be used with the collaborative workspace. The method determines preferences for each of the two or more participants as to a presentation of the collaborative workspace. The method receives one or more live images of the two or more participants and presents the collaborative workspace to each of the two or more participants in accordance with the preferences for each of the two or more participants. | 09-12-2013 |
20130288798 | GEOCACHING GAMES HAVING VIRTUAL PRIZES AWARDED IN AN ASSOCIATED VIDEO GAME AND RELATED METHODS AND COMPUTER PROGRAM PRODUCTS - Methods of implementing geocaching games are provided in which information is provided regarding a location of a waypoint. Thereafter, it is confirmed that a player of the game physically arrived at the waypoint. After such confirmation has been obtained, the player may be awarded a virtual prize. Related geocaching games and computer program products are also disclosed. | 10-31-2013 |
20130300561 | Devices and Methods for Detecting Environmental Circumstances and Responding With Designated Communication Actions - Provided are a wireless communication device and a communication device control method that include a set of templates corresponding to a plurality of potential environmental circumstances. The templates may be stored in a database in the computer readable memory of the communication device. At predetermined intervals, a suite of environmental sensors integral to the communication device may periodically sample the user's environment. The user's environmental circumstances may be derived or inferred by an analysis module based on the output of the suite of environmental sensors and then may be compared to the templates to determine a matching template. An action script is then executed based at least partially on the matching template which may include the contacting of a responding party. | 11-14-2013 |
20130316641 | Methods, Systems, and Computer-Readable Media for Utilizing a Repeating Function to Improve Quality of Service - Methods, systems, and computer-readable media provide for utilizing a repeating function to improve quality of service. According to embodiments, a method for utilizing a repeating function to improve quality of service is provided. According to the method a first mobile cellular device is selected. An instruction is transmitted to the first mobile cellular device instructing the first mobile cellular device. The instruction causes the first mobile cellular device to relay communications between the second mobile cellular device and the cellular service provider. The first mobile cellular device thereby provides the repeating function for the second mobile cellular device. | 11-28-2013 |
20140012920 | Device, System and Method for Recording Personal Encounter History - Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device. | 01-09-2014 |
20140155017 | SUPPLEMENTAL RESCUE RESOURCES - A supplemental rescue resources system can receive an emergency alert message from a mobile device and use data from the message and other sources to determine and select appropriate supplemental rescue resources, which may include may include any person that has volunteered or is otherwise a participant in the system that is not an on-duty emergency responder. The supplemental rescue resources system may select a supplemental rescue resources based on the location of such resources relative to the location of an incident, and/or the qualifications and/or preferences of such resources. The supplemental rescue resources system may direct resources to the incident and notify emergency services providers of the supplemental resources. The supplemental rescue resources system may request and/or receive additional information from supplemental resources, emergency services providers, and/or those reporting incidents and use this information to adjust the notified supplemental resources, update emergency services providers, and/or update affected parties. | 06-05-2014 |
20140155018 | CENTRALIZED RESCUE NETWORK - A centralized rescue network system can receive an emergency alert message from a mobile device and use data from the message and from other sources to determine an appropriate response resource allocation. The centralized rescue network system may also request and receive additional data from the sending mobile device, other mobile devices, and/or other systems. A response message may be sent to the sending mobile device, other devices and/or systems. The centralized rescue network system can send requests to emergency services providers based on its analysis and processing of the emergency alert message and any other data so that the most efficient use is made of emergency resources. | 06-05-2014 |
20140156390 | Methods, Systems, and Computer Program Products that us Measured Location Data to Identify Sources that Fraudulently Activate Internet Advertisements - Potential click fraud is determined. When a client device activates an Internet advertisement, the location of the client device is determined. Multiple activations of the same advertisement, by the client device, may indicate fraud. | 06-05-2014 |
20140156460 | Obtaining Ratings Using A Rating Service - Concepts and technologies are disclosed herein for obtaining ratings using a rating service. A server computer executing a rating service can detect arrival of a user device at a vendor location. The server computer also can detect an interaction with a product offered at the vendor location by the user device. The server computer can determine that a rating for the product is to be requested, and can request the rating from the user device. | 06-05-2014 |
20140207949 | Methods, Systems, and Computer Program Products for Monitoring Service Usage - Usage information is received that describes usage of communication services by a communications device. The usage information is compared to monitoring criteria. When the monitoring criteria are satisfied, an electronic notification message is sent to the communications device before an additional charge is incurred. | 07-24-2014 |
20140232644 | Gesture Control - Gesture control uses electromagnetic power signatures. A signal is received and a power of the signal is determined. The power is associated to a command, and the command is executed in response to a gesture. | 08-21-2014 |
20140237574 | Methods, Systems, and Products for Identity Verification - Methods, systems, and products verify identity of a person. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified. | 08-21-2014 |
20150026066 | User Terminal Location Based Credit Card Authorization Servers, Systems, Methods and Computer Program Products - Credit card transaction servers, systems, methods and computer program products receive information concerning a prospective credit card transaction with one of multiple credit card issuers and obtain location information from multiple wireless network providers for wireless terminal(s) that are associated with a user of the credit card for the prospective credit card transaction. The locations of the credit card transaction terminal(s) and the locations of the wireless terminal(s) are correlated, and authorization information for the prospective credit card transaction is generated based upon this location correlation. | 01-22-2015 |
20150033358 | Methods, Systems and Computer Program Products for Discreetly Monitoring a Communications Network for Sensitive Information - A method for monitoring a network for information includes repeatedly searching the network for sensitive information about a subscriber. The network is intermittently searched for obscuring information during the repeated searching to thereby disguise the sensitive information that is the target of the repeated searching. Related systems and computer program products are also discussed. | 01-29-2015 |