Patents - stay tuned to the technology

Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Jenny S. Li, Danbury US

Jenny S. Li, Danbury, CT US

Patent application numberDescriptionPublished
20080298238FILTERING IN BANDWIDTH SHARING AD HOC NETWORKS - Systems and methods for filtering in bandwidth sharing ad hoc networks. A method includes maintaining at least one filtering parameter associated with formation of a bandwidth sharing ad hoc network. The method further includes preventing data transfer across the bandwidth sharing ad hoc network when a parameter of a request to establish the bandwidth sharing ad hoc network corresponds to the at least one filtering parameter.12-04-2008
20080298282EFFICIENCY AND RESILIENCY ENHANCEMENTS FOR TRANSITION STATES IN AD HOC NETWORKS - A method includes establishing an ad hoc network between at least a borrower and at least one lender of bandwidth and downloading requested data from a data source via the ad hoc network. The method further includes leaving the ad hoc network while maintaining some of the downloaded requested data. The method further includes reestablishing a connection to the data source for completing the downloading of the requested data.12-04-2008
20080298283COALITION FORMATION AND SERVICE PROVISIONING OF BANDWIDTH SHARING AD HOC NETWORKS - Method, system, and computer program product for enabling dynamic creation of a coalition of multiplexed ad hoc networks to form larger ad hoc networks for service provisioning, in which multiplexers can be connected together in either a hierarchical structure or a parallel structure. Includes method, system, and computer program product for forming an ad hoc network composed of a multiplexer coupling a borrower to at least one lender and forming a coalition composed of the ad hoc network and at least one other multiplexer.12-04-2008
20080298284MARKET-DRIVEN VARIABLE PRICE OFFERINGS FOR BANDWIDTH-SHARING AD HOC NETWORKS - Systems and methods to establish and execute market-driven variable price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method comprises establishing and executing market-driven variable price offerings among lenders and borrowers. A bandwidth-sharing ad hoc network for shared bandwidth usage is formed based on the established and executed market-driven variable price offering.12-04-2008
20080298314OPTIMIZATION PROCESS AND SYSTEM FOR A HETEROGENEOUS AD HOC NETWORK - Method and system for optimizing selection of a network. The method includes identifying available lenders and existing networks within a vicinity of a borrower, selecting an optimization technique for completing a task of the borrower, calculating, for a plurality of network options, a value for completing the borrower's task according to the optimization technique, and selecting an optimum network option to complete the borrower's task. The plurality of network options includes forming a heterogeneous network composed of both a peer-to-peer network and a multiplexed network.12-04-2008
20080298327SYSTEMS AND METHODS FOR ESTABLISHING GATEWAY BANDWIDTH SHARING AD-HOC NETWORKS - Systems and methods for establishing gateway bandwidth sharing ad hoc networks. In a first aspect, a method includes establishing a relationship with a gateway that retrieves data from a remote location and divides the data into at least a first portion and a second portion. The method further includes establishing an ad hoc network comprising at least one local lender, receiving the first portion from the gateway via the at least one local lender, receiving the second portion from the gateway, and joining the first portion and the second portion to re-create the data.12-04-2008
20080299988SYSTEM AND METHOD FOR ESTABLISHING PEER-TO-PEER BANDWIDTH SHARING AD HOC NETWORKS - Systems and methods for establishing peer-to-peer bandwidth sharing ad hoc networks. A method includes: determining a first location and a second location of data; instructing a first device to download a first portion of the data from the first location; instructing a second device to download a second portion of the data from the second location; and receiving the first portion of the data from the first device and the second portion of the data from the second device.12-04-2008
20080300889FORMATION AND REARRANGEMENT OF LENDER DEVICES THAT PERFORM MULTIPLEXING FUNCTIONS - A method comprises establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two lenders as a multiplexer to manage data flow over the ad-hoc network between the borrower and lenders of the at least two lenders of bandwidth. The method may include providing a computer infrastructure to perform the steps of the invention. A system is also provided which includes a server having a database containing data associated with one or more lenders and a borrower in an ad-hoc network and at least one hardware and/or software component. The system may further includes computer usable medium having readable program code embodied in the medium to perform processes of the invention.12-04-2008
20080300890PRICE OFFERINGS FOR BANDWIDTH-SHARING AD HOC NETWORKS - Methods and systems to establish and execute price offerings among the lenders and borrowers in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method comprises establishing a price offering among a lender and borrower in a bandwidth-sharing ad hoc network for shared bandwidth usage. The method further includes executing the price offering upon acceptance of a lender to the bandwidth-sharing ad hoc network for shared bandwidth usage.12-04-2008
20080300931OPTIMIZATION PROCESS AND SYSTEM FOR MULTIPLEXED GATEWAY ARCHITECTURE - Process and system for optimizing one of uploading and downloading of at least one file through at least one lender in multiplexed gateway architecture. The process includes identifying available lenders coupled to a multiplexed gateway within a vicinity of a borrower, selecting an optimization criterion, and selecting a number of the identified available lenders based upon the selected optimization criterion. The method also includes dividing at least one file to be one of uploaded and downloaded into parts corresponding to the number of selected lenders, and assigning a part of the at least one file to each selected lender.12-04-2008
20080300932OPTIMIZATION PROCESS AND SYSTEM FOR NON-MULTIPLEXED PEER-TO-PEER ARCHITECTURE - Process and system for optimizing one of uploading and downloading of at least one file through at least one lender in a peer-to-peer architecture. The process includes identifying available lenders within a vicinity of a borrower, selecting a number of lenders based upon at least one requester optimization criterion, dividing the at least one file to be one of uploaded or downloaded into parts corresponding to the number of selected lenders, assigning a part of the at least one file to each selected lender, and performing one of an upload or a download of the parts through the selected lenders.12-04-2008
20080300975DEMAND PULL AND SUPPLY PUSH COMMUNICATION METHODOLOGIES - Systems and methods for determining whether a node in a bandwidth-sharing ad hoc network should advertise as a borrower or a lender of bandwidth, or alternatively not advertise as either a borrower or lender of bandwidth. The method comprises establishing an ad-hoc network between nodes configured to be a borrower of bandwidth or a lender of bandwidth. At least one of the nodes advertises to be the borrower of bandwidth or the lender of bandwidth in the ad hoc network based on at least one selected factor.12-04-2008
20080300997PAYMENT TRANSFER STRATEGIES FOR BANDWIDTH SHARING IN AD HOC NETWORKS - Systems and methods for compensating lenders of bandwidth in an ad hoc network and, more particularly, to systems and methods for providing payment strategies for bandwidth sharing in an ad-hoc network. The method comprises establishing an ad-hoc network between a borrower and at least one lender of bandwidth, and providing compensation instructions to compensate the at least one lender of bandwidth for lending the bandwidth to the borrower. The system may be a computer infrastructure for implementing the steps of the method.12-04-2008
20080301017FORMATION AND REARRANGEMENT OF AD HOC NETWORKS - Systems and methods for the formation and rearrangement of ad hoc networks and more particularly to systems and methods for sharing bandwidth in ad hoc networks. The method comprises broadcasting a table to at least one potential lender requesting pertinent lender information and receiving the table from the at least one potential lender with the pertinent lender information. The method further includes selecting one or more lenders of the at least one potential lender which meet preset criteria and establishing an ad hoc network with the one or more lenders based on the selecting.12-04-2008
20080301039SYSTEM AND METHOD FOR FAIR-SHARING IN BANDWIDTH SHARING AD-HOC NETWORKS - Systems and methods for fair-sharing in bandwidth sharing ad-hoc networks. A method includes maintaining a borrower account and lender account of a borrower and a lender of an ad hoc network. The method also includes adjusting at least one of the borrower account and the lender account based upon data transfer by the lender for the borrower.12-04-2008
20090054061SYSTEM AND METHOD OF LOCATING WIRELESS CONNECTION AMONG A PLURALITY OF WIRELESS CONNECTIONS - A system and method of locating a wireless connection among a plurality of possible wireless connections. More particularly, a system and method of locating a user preferred wireless connection among a plurality of possible wireless connections. The method includes scanning for available networks and determining whether the available networks satisfy one or more user preferences. The method further includes establishing a secondary network connection with one of the available networks based on one or more user preferences being satisfied.02-26-2009
20090094244METHOD FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list.04-09-2009
20090112683METHOD, SYSTEM AND PROGRAM PRODUCT FOR DISTRIBUTION OF FEEDBACK AMONG CUSTOMERS IN REAL-TIME - A method, system and program product for providing distribution of customer feedback pertaining to an aspect of a retail environment. The method includes creating either a text, an audio or visual tag for inputting into a tool, feedback from customers using a plurality of devices, the tag including either a product-related or a location-related tag that can be used to extrapolate on the feedback. The method further includes identifying respective locations of customers, collecting in real-time the feedback inputted by the customers and providing a user, a customer that has provided feedback or not, access to the feedback collected based on either an inquiry submitted to the tool by the user or based on a current location of the user identified by the tool. The method further includes retrieving in real-time a subset of the feedback collected based on either the inquiry submitted or the current location of the user.04-30-2009
20090113446METHOD FOR CREATING ADAPTIVE DISTRIBUTIONS - A method to dynamically create an adaptive distribution list through an application of a combination of mathematical, logical and/or programmable operations to existing static distribution lists or user directories. This list is created as part of the information message sent to the entries on the distribution list. In this invention, the user or sender does not need to interface with the Group creation modification tool. Another feature of the invention is that the newly created distribution lists can be temporarily or permanently saved as designed by the sender. This invention eliminates the need to separately create distribution and then send messages to the entries on the distribution list.04-30-2009
20090125602AUTOMATIC PRIORITY ADJUSTMENT FOR INCOMING EMAILS - A method, an information processing system, and a computer readable storage medium for at least one of assigning and dynamically adjusting a priority level associated with an email message. The method includes receiving at least one email message associated with a recipient. Definitions of a plurality of priority assignment parameters and respective priority levels that are associated with each of the plurality of priority assignment parameter are accepted from a user. At least one identified priority assignment parameter within the plurality of priority assignment parameters is identified within the at least one email message. A corresponding priority level that is associated with the at least one identified priority assignment parameter is assigned to the at least one email message.05-14-2009
20090182820METHOD FOR AUTOMATICALLY MODIFYING ELECTROINIC DISTRIBUTION LISTS USING PREDEFINED RULES - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list.07-16-2009
20090187461MARKET SEGMENTATION ANALYSES IN VIRTUAL UNIVERSES - This description presents techniques for performing market segmentation analyses in virtual universes. In one embodiment, a method includes collecting virtual universe data associated with interactions between avatars, entities, and objects in a virtual universe. The collecting can include recording at least some of the virtual universe data as the interactions occur, determining a criteria with which to perform a market segmentation analysis on the virtual universe data, where segmentation divides the virtual universe data into a plurality of groups. The method can also include performing the market segmentation analysis on the virtual universe data, and generating a report indicating results of the market segmentation analysis.07-23-2009
20090210803AUTOMATICALLY MODIFYING COMMUNICATIONS IN A VIRTUAL UNIVERSE - Described herein are processes and systems that automatically modify communications in a virtual universe. One of the systems described is a virtual communication modifier system. The virtual communication modifier system detects a communication intended for use in the virtual universe. The virtual communication has characteristics, such as language, format, sound quality, and text properties that can be modified automatically. The virtual communication modifier system determines whether a characteristic of the communication is different from a characteristic indicated within a user preference. If the characteristic of the communication is different from the indicated characteristic, then the virtual communication modifier system automatically modifies the communication characteristic to comport with the indicated characteristic (e.g., automatically converts the language of the communication from English to Spanish). The virtual communication modifier system then presents the modified communication.08-20-2009
20090281847Method and System For Data Disaggregation - A method and system for migrating source data from a source database to a destination database based on energy efficiency and conservation. A migration server evaluates the source data for usage and requirements and defines data usage and requirement tags for the source data. The source data is disaggregated into one or more source data sets based on the data usage and requirement tags. The migration server then identifies candidate destinations for the source data, wherein each candidate destination has stored data identified with usage and requirement tags. The data migration server compares the first usage and requirement tags of the source data with the second usage and requirement tags of the stored data and identifies an optimal destination database based on the comparing step. The data migration server migrates the source data to the optimal destination database.11-12-2009
20090282044Energy Efficient Data Provisioning - A method and system for provisioning data that has been collected and stored in a source database. The source database is a database that consumes a large amount of power and drains the company's database resources. The method and system determine which data should be provisioned and sent to a target server, the target server being more energy efficient than the source database and less exhausting of company resources. Various factors, such as the amount of data being requested and the frequency of change of the requested data, determine whether a transfer of data from the source database to the more energy efficient target database should be performed.11-12-2009
20090282090Method and System For Data Dispatch - A method and system for migrating source data from one or more databases to a destination database, wherein the destination database is selected based on power consumption of the destination database. A data migration server determines which destination database should be selected by selecting a number of candidates and comparing the power consumed, the available space and the maximum monthly power consumption limit. A user intervention policy is created to evaluate which data should be moved to a destination database. A “payback period” is calculated to determine the amount of time that will elapse before savings are realized.11-12-2009
20090282273Method and System For Data Migration - A method and system for migrating source data from one or more databases to a destination database, wherein the destination database is selected based on power consumption of the destination database. A data migration server determines which destination database should be selected by selecting a number of candidates and comparing the power consumed, the available space and the maximum monthly power consumption limit. A user intervention policy is created to evaluate which data should be moved to a destination database. A “payback period” is calculated to determine the amount of time that will elapse before savings are realized.11-12-2009
20090307021METHOD FOR INVENTORY GOVERNANCE IN A VIRTUAL UNIVERSE - The present invention is directed to inventory governance in a virtual universe. A method of inventory governance in a virtual universe (VU) includes: providing an inventory for a virtual universe (VU) resident; and providing means for governing at least one aspect of the inventory, the governing means comprising at least one of: an administrative interface for establishing an authorizing relationship between the VU resident and an authorizing entity; a filtering interface for administering at least one filter to the inventory; or a monitoring interface for providing capability to monitor at least one of: the VU resident or the inventory.12-10-2009
20090307110MANAGEMENT OF VIRTUAL UNIVERSE ITEM RETURNS - The present invention relates to relates to the management of virtual universe item returns. A method for in accordance with an embodiment of the present invention includes: initiating a return of a item by a user in a virtual universe; granting control of the return of the item to a return agency, the return agency submitting a return request on behalf of the user to a vendor associated with the item; upon approval of the return request by the vendor, sending instructions to the user to destroy the item; and upon confirmation of the destruction of the item by the user, crediting the user for the return.12-10-2009
20090313085INTERACTIVE PRODUCT EVALUATION AND SERVICE WITHIN A VIRTUAL UNIVERSE - An approach that provides interactive product evaluation and service within a virtual universe is described. In one embodiment, there is an evaluation indicating component that is configured to permit an owner of a virtual universe product to indicate a desire to have at least one avatar in the virtual universe evaluate the virtual universe product. An evaluation generating component is configured to generate an invitation that requests an evaluation of the virtual universe product. An evaluation collecting component is configured to collect the evaluation of the virtual universe product.12-17-2009
20100017260METHOD AND SYSTEM FOR VIRAL MARKETING WITHIN A VIRTUAL WORLD - A method implemented in a computer infrastructure having computer executable code, including generating one or more ad-avatars in a virtual universe (VU) and monitoring information from the VU. Additionally, the method includes directing the one or more ad-avatars to perform one or more viral advertisements in the VU based on the information.01-21-2010
20100083148AVATAR APPEARANCE TRANSFORMATION IN A VIRTUAL UNIVERSE - Methods, articles of manufacture, systems, articles and programmable devices are provided for configuring a chameleon avatar in response to data associated with a target avatar within a virtual universe. In response to determining that an engagement of a chameleon avatar with a target avatar is indicated, it is determined whether the chameleon avatar should maintain an initial appearance or be auto-morphed for engagement with the target avatar. Auto-morphing may be accomplished by reading an attribute from metadata associated with the target avatar, selecting a baseline avatar template and auto-morphing the baseline template to incorporate the read attribute. Target avatar attributes include gender, interests, outfits attribute, ethnic data, language and preferences, as well as others. The chameleon may mimic an appearance of the target avatar.04-01-2010
20110010675Use of Real Time Location Information for User Authentication and Authorization in Virtual Environments - Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user.01-13-2011
20110055344SYSTEM FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - A system in which an initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the entries in the created distribution list are examined. From this list, features of the entries are identified. From these features, criteria are generated that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list.03-03-2011
20110307299MARKET SEGMENTATION ANALYSES IN VIRTUAL UNIVERSES - A method for market segmentation analysis includes a computer collecting virtual universe data associated with interactions between avatars, entities, and objects in a virtual universe. The computer collecting the virtual universe data includes the computer recording portions of the virtual universe data as the interactions occur. The method includes the computer determining criteria with which to perform a market segmentation analysis on the virtual universe data. The method further includes the computer performing the market segmentation analysis on the virtual universe data, which includes the computer analyzing a plurality of groups of the virtual universe data. The groups are formed based on whether an avatar activity includes social activity and business activity in the virtual universe relative to a time of day. The method further includes the computer generating a report indicating results of the market segmentation analysis.12-15-2011
20120059917SOFTWARE LICENSE MANAGEMENT WITHIN A CLOUD COMPUTING ENVIRONMENT - Embodiments of the present invention provide a solution to manage software licenses within a cloud computing environment. Specifically, aspects of the present invention (among other things): determine a requester's/customer's needs; identify a set (at least one) of providers capable of addressing the requester's licensing needs; and match the customer with the most appropriate provider. The embodiments of the present invention will also analyze current licensing configurations/models of the requesters, providers, and software vendors to identify areas of potential improvement. This provides the functionality necessary to adjust software license level in a dynamic fashion so as to best meet the customer's needs.03-08-2012
20120131677IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.05-24-2012
20120158853SENDING A CHAT CONTEXT TO A RECIPIENT - In an embodiment, a plurality of respective context keywords are stored to a plurality of contexts, wherein each of the plurality of respective context keywords is different. In response to sending of a first plurality of instant messages from an electronic device, a first context is selected at the electronic device from among the plurality of contexts. A first context keyword of the plurality of respective context keywords that matches respective first terms in the first plurality of instant messages is stored in the first context. The first plurality of instant messages are stored to a first chat session in the first context that was selected by the selecting. The first context that comprises the first plurality of instant messages and the first context keyword is sent to a recipient device.06-21-2012
20120219132Dynamic Call Management and Display - An embodiment includes one or more call systems and a computer processor communicatively coupled with the one or more call systems. The computer processor is configured to receive a communication from a first call system of the one or more call systems. The computer processor is further configured to retrieve recipient data from a second call system of the one or more call systems. The recipient data includes one or more receiver conditions. The computer is additionally configured to determine if the one or more receiver conditions have been met, and if they have been met, the computer processor forwards the communication to the second call system.08-30-2012
20120246321SYSTEM AND METHOD FOR FAIR-SHARING IN BANDWIDTH SHARING AD-HOC NETWORKS - Systems and methods for fair-sharing in bandwidth sharing ad-hoc networks. A method includes maintaining a borrower account and lender account of a borrower and a lender of an ad hoc network. The method also includes adjusting at least one of the borrower account and the lender account based upon data transfer by the lender for the borrower.09-27-2012
20120292304PORTABLE ELECTRONIC DEVICE CASE WITH ACTIVE THERMAL PROTECTION - A device case for a portable electronic device is provided and includes mechanical protection for the device, an active thermal element incorporated within the mechanical protection and a controller to control an operation of the active thermal element, the controller being configured to limit power consumption of the active thermal element and to maintain a predefined internal device temperature.11-22-2012
20120314622FORMATION AND REARRANGEMENT OF LENDER DEVICES THAT PERFORM MULTIPLEXING FUNCTIONS - A method includes establishing an ad-hoc network between a borrower and at least two lenders of bandwidth and establishing one lender of the at least two lenders as a multiplexer to manage data flow over the ad-hoc network between the borrower and lenders of the at least two lenders of bandwidth. The method may include providing a computer infrastructure to perform the steps of the invention. A system is also provided which includes a server having a database containing data associated with one or more lenders and a borrower in an ad-hoc network and at least one hardware and/or software component. The system may further include computer usable medium having readable program code embodied in the medium to perform processes of the invention.12-13-2012
20120324396METHOD FOR QUICK APPLICATION ATTRIBUTE TRANSFER BY USER INTERFACE INSTANCE PROXIMITY - Techniques are described for allowing a user to designate one of the windows on a display device (e.g., computer monitor) as a model window. Doing so permits the user to transfer the settings of an attribute (e.g., a font, color scheme, security setting, display of a toolbar, a user-defined attribute etc.) associated with the model window to another window located on the display device once the user moves the model window within a certain distance of the other window. The settings of the attributes of the model window are then transferred to the attributes of the other window. Moreover, the assigned settings may be rolled back after a specified amount of time has elapsed. The window whose attributes were changed may then revert back to either default settings or the settings before the attributes were changed to the attribute settings of the model window.12-20-2012
20130003606FORMATION AND REARRANGEMENT OF AD HOC NETWORKS - Systems and methods for the formation and rearrangement of ad hoc networks and more particularly to systems and methods for sharing bandwidth in ad hoc networks. The method comprises broadcasting a table to at least one potential lender requesting pertinent lender information and receiving the table from the at least one potential lender with the pertinent lender information. The method further includes selecting one or more lenders of the at least one potential lender which meet preset criteria and establishing an ad hoc network with the one or more lenders based on the selecting.01-03-2013
20130013375MARKET SEGMENTATION ANALYSES IN VIRTUAL UNIVERSES - A computer system for market segmentation analysis includes program instructions to be executed. The program instructions are configured to collect virtual universe data about avatars, entities, and objects in a virtual universe. The program instructions are configured to perform a market segmentation analysis on the virtual universe data, wherein the market segmentation analysis comprises a first segmentation across multiple segments of the avatars that is based on an amount of time and an amount of money spent in the virtual universe. The market segmentation analysis further comprises a second segmentation across multiple segments of the avatars that is based on whether activity of the avatars includes social activity and business activity in the virtual universe relative to a time of day. The program instructions are configured to receive, from users, consent allowing collection of the virtual universe data and to present a reward to the users for giving the consent.01-10-2013
20130105138PORTABLE ELECTRONIC DEVICE CASE WITH ACTIVE THERMAL PROTECTION05-02-2013
20130124643SYSTEM AND METHOD FOR COMMUNICATION THREAD MANAGEMENT - Described are systems and methods for managing an electronic communication thread. A thread is identified between a first electronic device and a plurality of second electronic devices. A parameter is generated to stop watching communications generated by the second electronic devices related to the thread. At least one new communication from the second electronic devices is detected, the at least one new communication related to the thread. An action is performed in accordance with criteria established with respect to the thread in response to detecting the at least one new communication.05-16-2013
20130133038AUTHENTICATION FOR SOCIAL NETWORKING MESSAGES - A tool for verifying that a message received by a social networking service was sent by a bona fide owner of a social networking account who purportedly sent the message. The tool receives a message and it locates in the message a string that was entered into a message text field of the message. The string is compared with a registered authentication string for the bona fide owner of the account. If the string in the message matches the registered authentication string, the string is removed from the message and the message is forwarded to the social networking service. If the string in the message does not match the registered authentication string, the message is blocked from being forwarded to the social networking service.05-23-2013
20130191110METHOD FOR CHARACTER CORRECTION - A computer program product is provided and includes a non-transitory tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes enabling retrieval of a keyboard pressed sequence of characters of a first type, permitting a re-selection of characters of a second type, which are associated with the keyboard pressed sequence of the characters of the first type and permitting modification of the keyboard pressed sequence of the characters of the first type to initiate a search for and retrieval of characters of the second type.07-25-2013
20130246040DYNAMIC MEDIA CAPTIONS IN A SOCIAL NETWORK ENVIRONMENT - A dynamic media caption apparatus and method in a social network environment. Included is a user interface to define syntax and distribution rules for a media caption in a social network; a distribution rules engine to understand the syntax and distribution rules defined in the user interface for the media caption and output a media caption that is customized according to the distribution rules; and a distribution manager to translate the customized media caption output by the distribution rules engine to a language understandable by the social network, generate the customized media caption in the language understandable by the social network and output the translated customized media caption to the social network, the customized media caption changing according to the distribution rules and a relationship to the user of a viewer of the media caption on the social network.09-19-2013
20130282836Propagation of Message Having Time-Based Information - A method for propagating a message includes searching a plurality of messages for time-based information; associating located time-based information with the corresponding message as meta-data; extracting the meta-data and propagating the message as the time-based information approaches; and displaying the propagated message in a graphical user interface.10-24-2013
20130301462OPTIMIZATION PROCESS AND SYSTEM FOR A HETEROGENEOUS AD HOC NETWORK - Method and system for optimizing selection of a network. The method includes identifying available lenders and existing networks within a vicinity of a borrower, selecting an optimization technique for completing a task of the borrower, calculating, for a plurality of network options, a value for completing the borrower's task according to the optimization technique, and selecting an optimum network option to complete the borrower's task. The plurality of network options includes forming a heterogeneous network composed of both a peer-to-peer network and a multiplexed network.11-14-2013
20130305316COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.11-14-2013
20130305318COMMUNICATIONS SECURITY MANAGEMENT - Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions.11-14-2013
20140006310METHOD, SYSTEM AND PROGRAM PRODUCT FOR DISTRIBUTION OF FEEDBACK AMONG CUSTOMERS IN REAL-TIME01-02-2014
20140012642EVENT-BASED MANAGEMENT OF A COUPON PROMOTION - An approach for managing a coupon based on an event is presented. Information about an event is received. Attributes indicating an email or text message communication is from a retailer are received. The communication is received. The communication is determined to be from the retailer and include the coupon by determining the communication has the received attributes. Based on the communication having the attributes, the coupon included in the communication is associated with the event. A user selection of the event is received to display the received information about the event and a link to the communication that includes the coupon associated with the selected event.01-09-2014
20140019418PREVENTING MOBILE COMMUNICATION DEVICE DATA LOSS - A mobile communication device includes a temperature sensor configured to sense a temperature and a control unit configured to determine whether a change in the sensed temperature relative to a previously-sensed temperature corresponds to a critical time range. The control unit is also configured to store data in a data storage unit when it is determined that the change in the sensed temperature corresponds to the critical time range.01-16-2014
20140025752MESSAGE DISTRIBUTION AND VIEWING RULES IN A NETWORK - A system, method and computer-readable medium for displaying a message over a network are disclosed. A distribution indicator is associated with a defined distribution rule for displaying messages over the network. A message includes the distribution indicator in the message. The message is displayed over the network according to the distribution rule indicated by the distribution indicator included in the message.01-23-2014
20140028708GRAPHICALLY REPRESENTING TAGS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc.01-30-2014
20140067824DATABASE TABLE FORMAT CONVERSION BASED ON USER DATA ACCESS PATTERNS IN A NETWORKED COMPUTING ENVIRONMENT - An approach for conversion between database formats (e.g., from a relational database format to a hash table or a “big table” database format) based on user data access patterns in a networked computing environment is provided. A first set of database tables having a first format is identified based on a set of access patterns stored in a computer storage device. A second set of database tables having a second database format corresponding to the first set of database tables may then be provided (e.g., accessed, augmented, and/or generated). A mapping between the first set of database tables and the second set of database tables may then be created. A column set may then be generated based on at least one condition of the set of queries. The column set may then be used as a key for the second set of database tables.03-06-2014
20140104182METHOD FOR CHARACTER CORRECTION - A computer program product is provided and includes a non-transitory tangible storage medium readable by a processing circuit and on which instructions are stored for execution by the processing circuit for performing a method. The method includes enabling retrieval of a keyboard pressed sequence of characters of a first type, permitting a re-selection of characters of a second type, which are associated with the keyboard pressed sequence of the characters of the first type and permitting modification of the keyboard pressed sequence of the characters of the first type to initiate a search for and retrieval of characters of the second type.04-17-2014
20140137258IMAGE VULNERABILITY REPAIR IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach to repair vulnerabilities (e.g., security vulnerabilities) in images (e.g., application images) in a networked computing environment (e.g., a cloud computing environment). Specifically, an image is checked for vulnerabilities using a database of known images and/or vulnerabilities. If a vulnerability is found, a flexible/elastic firewall is established around the image so as to isolate the vulnerability. Once the firewall has been put in place, the vulnerability can be repaired by a variety of means such as upgrading the image, quarantining the image, discarding the image, and/or generating a new image. Once the image has been repaired, the firewall can be removed.05-15-2014
20140149193MANAGING A RETAIL OFFER - An approach for managing retail offer(s) based on information from a social networking website is presented. Information about an event is received. The event is determined to be relevant to user(s) of the social networking website by determining preferences of the user(s) and determining the user(s) have an interest in the event based on the preferences. Retail offers are received. Received retail offer(s) are determined to be relevant to the event by determining a preference of an individual associated with event and determining the individual has an interest in the retail offer(s) based on the preference. Based on the event being relevant to the user(s) and the retail offer(s) being relevant to the event, the retail offer(s) are displayed for viewing by the user(s) via an interface provided by the social networking website.05-29-2014
20140172841SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword.06-19-2014
20140207768SEARCH ENGINE OPTIMIZATION USING A FIND OPERATION - Provided are a computer implemented method, computer program product, and system for ranking search results. It is determined that a find operation with a find keyword has been issued for a page. In response to determining that the find keyword has been located on the page, the find keyword is stored in an index as relevant text for the page. In response to receiving a subsequent search request for which the page is retrieved, the page is ranked based on the find keyword.07-24-2014
20140310346DATA ANALYTICS AND SECURITY IN SOCIAL NETWORKS - A method for securing a social network account assigned to a member is provided. The method may include determining at least one social network account assigned to the member, the member being in electronic communication with the at least one social network account via a communication network, using a software program on a computer having a processor for executing the software program. The method may also include determining a pattern of communications between the member and the at least one social network account and generating a profile for the at least one social network account assigned to the member based on the pattern of communications. The method may further include monitoring an electronic communication with the at least one social network account by the member based on comparing the generated profile with the electronic communication.10-16-2014
20140344206VERIFYING LEGITIMATE FOLLOWERS IN SOCIAL NETWORKS - A method for verifying a legitimate follower in a social network account assigned to a user is provided. The method may include generating a set of user defined rules associated with verifying a follower request. The method may further include monitoring the social network account assigned to the user to identify the follower request and analyzing the identified follower request to determine the legitimate follower based on the set of user-defined rules.11-20-2014
20140378108LOCATION-BASED CONFERENCE CALL DIAL-IN NUMBER RETRIEVAL AND INCLUSION - A dial-in number is provided to a participant of a conference call. A computer identifies a participant of a conference call, and attempts to determine the location of the participant. Responsive to determining the location of the participant, the computer determines a location-based dial-in number for the participant and transmits the determined location-based dial-in number to the participant. Responsive to failing to determine the location of the participant, the computer determines an alternative dial-in number for the participant and transmits the determined alternative dial-in number to the participant. The computer can determine the location of the participant based on attributes derived from a location service enabled application or device associated with the participant.12-25-2014

Patent applications by Jenny S. Li, Danbury, CT US

Website © 2015 Advameg, Inc.