Patent application number | Description | Published |
20110028124 | Software Switch for Separating Work and Personal Information on Cell Phone Devices - This is a cell phone system that provides for use of a single phone for both business and personal calls. This system permits the user to extract personal calls from the system, thereby preserving the confidential nature of some of these personal calls without the business having to review them to determine allocation of costs to user and business. | 02-03-2011 |
20110043831 | METHOD AND SYSTEM FOR AUTOMATICALLY REDUCING PAGE COUNT IN A DOCUMENT PRINTING PROCESS - A system automatically determines whether to shrink a document to be printed by determining whether various parameters of the final page of the document satisfy certain criteria. If so, the system may automatically shrink the document by using a shrink-to-fit process and/or by automatically reducing the font size of some or all content in the document. | 02-24-2011 |
20110043846 | METHOD AND SYSTEM FOR REDUCING MATERIALS USAGE ASSOCIATED WITH DOCUMENT PRINTING - A system for performing a print job request includes a processor, a printing device, and a computer-readable storage medium in communication with the processor. The computer-readable storage medium includes one or more programming instructions for receiving a print job request having a first set of one or more printing parameters, identifying a final page of the print job request, determining a measurement for the final page through the processor, determining a threshold measurement through the processor based on a second set of one or more printing parameters, determining through the processor whether to remove the final page from the print job request based on the measurement and the threshold measurement, removing the final page from the print job request in response, and performing the print job request through the printing device to yield a printed document. The print job request pertains to information displayed on a web site. | 02-24-2011 |
20110216349 | DELAYED PRINTING FROM A COMPUTERIZED DEVICE - A user of a computerized device creates an item capable of being printed and stores the item within storage of the computerized device. An instruction to perform delayed printing of the item is received from a user of a computerized device when the user is outside a predetermined physical range of at least one printing device. The computerized device detects when the computerized device is within the predetermined physical range of the printing device and, when this occurs, the computerized device provides the user a printing option to print the item on the printing device. If the user selects the printing option, the methods herein forward the item to a conversion device. The conversion device makes the item print ready so that the item can be printed using the printing device. The methods herein then cause the item to be forwarded from the conversion device to the printing device and printed on the printing device. | 09-08-2011 |
20130097167 | Method and system for creating ordered reading lists from unstructured document sets - Systems and methods for organizing a repository of unstructured documents into groups of ordered reading lists, i.e., document trails, comprising an ordered list of documents that relate to each by subject matter. Text analytics and natural language processing sets group documents, chose the most important/relevant documents from each group, and organize the documents into a suggested reading order. Additionally, documents within each document trail may be marked up or highlighted to indicate which paragraphs therein contain novel or useful information, or information that is not useful or redundant | 04-18-2013 |
20130097494 | Method and system for visual cues to facilitate navigation through an ordered set of documents - Systems and methods for organizing a repository of unstructured documents into groups of ordered reading lists, i.e., document trails, comprising an ordered list of documents that relate to each by subject matter. Text analytics and natural language processing steps group documents, chose the most important/relevant documents from each group, and organize the documents into a suggested reading order. Document fragments are also analyzed by such analytic and processing steps to identify preselected fragment characteristic aspects. Documents within each document trail may be marked up or highlighted to indicate which paragraphs therein contain such aspects as novel or useful information, or information that is not useful or redundant. | 04-18-2013 |
20130272523 | MOBILE FIELD LEVEL ENCRYPTION OF PRIVATE DOCUMENTS - A method and system are disclosed for field level encryption of a document that provides a hardcopy having redacted sensitive information fields with multiple levels of access and an augmented reality view of the hardcopy displaying the unredacted sensitive information fields. Identification of the sensitive information fields may be accomplished via highlight color, user designation, or linguistic analysis. The identified fields are encrypted and may be stored separately, embedded in place, or embedded in a two-dimensional glyph. This information may be stored in association with a device identification of an authenticated mobile device and a document identification. A redacted hardcopy of the original document is output. A mobile device captures an image of the redacted hardcopy, decrypts the encrypted sensitive information fields, and generates an augmented reality view of the hardcopy with the previously redacted sensitive information fields visible on the display of the mobile device. | 10-17-2013 |
20140126823 | SYSTEM AND METHOD FOR IDENTIFYING AND ACTING UPON HANDWRITTEN ACTION ITEMS - A method and system for identifying and acting on a handwritten action item is disclosed. The system may learn a set of user-defined symbols and associate each symbol with an action category. Then, when the system that captures a handwritten action item that includes one of the symbols, it will determine which action category that corresponds to the symbol, identify process parameters in the action item, determine a task to be performed based on the action category, and apply the process parameters to automatically perform the task. | 05-08-2014 |
20140283014 | User identity detection and authentication using usage patterns and facial recognition factors - In a mobile communication device having segregated workspaces respectively associated with a plurality of users, methods and systems are provided for confirming an authorized user in an appropriate account including a corresponding one of the segregated workspaces. Start-up processing of the device includes taking a picture of an authorized image of the authorized user with the device camera. Current activities of the device by the user are monitored relative to a predetermined set of device activities and usage rules. Certain activities are indicative of a change in user of the device from the authorized user. Upon detection of such a change, the current image of the current user of the device is acquired with the device camera. The current image is compared with the authorized image and if the comparison fails to detect a match, the current user is prompted to initiate a log-in process. | 09-18-2014 |