Elwha LLC, a limited liability corporation of the State of Delaware Patent applications |
Patent application number | Title | Published |
20150203213 | UNOCCUPIED FLYING VEHICLE (UFV) LOCATION CONFIRMANCE - Disclosed herein are example embodiments for unoccupied flying vehicle (UFV) location confirmance. For certain example embodiments, at least one machine, such as a UFV, may: (i) obtain at least one indication of at least one location of a UFV; or (ii) attempt to counter at least one attack against a location determination for the UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 07-23-2015 |
20150120551 | MOBILE DEVICE-FACILITATED GUARANTY PROVISIONING - Disclosed herein are example embodiments for mobile device-facilitated guaranty provisioning. For certain example embodiments, at least one device, such as a mobile device of a user or customer: (i) may obtain one or more transaction characteristics of at least one product transaction that relates to at least one customer; or (ii) may communicate one or more messages to support a provisioning of at least one guaranty corresponding to at least one product transaction. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120550 | GUARANTY PROVISIONING VIA WIRELESS SERVICE PURVEYANCE - Disclosed herein are example embodiments for guaranty provisioning via wireless service purveyance. For certain example embodiments, at least one device, such as a server device of a wireless service provider: (i) may detect at least one proffered guaranty transaction that is associated with at least one product transaction; or (ii) may proffer at least one guaranty based at least partially on at least one wireless service data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120530 | GUARANTY PROVISIONING VIA SOCIAL NETWORKING - Disclosed herein are example embodiments for guaranty provisioning via social networking. For certain example embodiments, at least one device, such as a server device of a social network: (i) may detect at least one proffered guaranty transaction that is associated with at least one product transaction; or (ii) may proffer at least one guaranty based at least partially on at least one social network data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120502 | SUPPORTING GUARANTY PROVISIONING VIA USER ATTRIBUTE PROFFERING - Disclosed herein are example embodiments for supporting guaranty provisioning via user attribute proffering. For certain example embodiments, at least one device, such as a server device of a data provider: (i) may detect one or more opportunities to proffer at least one user attribute to at least one potential guarantor; or (ii) may proffer at least one user attribute based at least partially on at least one data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120501 | FINANCIER-FACILITATED GUARANTY PROVISIONING - Disclosed herein are example embodiments for financier-facilitated guaranty provisioning. For certain example embodiments, at least one device, such as a server device of a financier: (i) may discover at least one authorization request corresponding to at least one product transaction; or (ii) may provide at least one proffered guaranty transaction to at least one guarantor. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120500 | FACILITATING GUARANTY PROVISIONING FOR AN EXCHANGE - Disclosed herein are example embodiments for facilitating guaranty provisioning for an exchange. For certain example embodiments, at least one device, such as a mobile device or a server device or an electronic apparatus: (i) may facilitate a matching of at least one proffered guaranty transaction with one or more proffered transaction characteristics; or (ii) may participate in at least one guaranty transaction marketplace to produce at least one guaranty transaction associated with at least one guaranty for a proposed product transaction. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120473 | VENDOR-FACILITATED GUARANTY PROVISIONING - Disclosed herein are example embodiments for vendor-facilitated guaranty provisioning. For certain example embodiments, at least one device, such as a payment authorization apparatus: (i) may obtain one or more transaction characteristics of at least one product transaction that relates to at least one customer; or (ii) may generate one or more messages to pursue purchase permission with respect to at least one customer and with at least one guaranty corresponding to at least one product transaction. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20150120440 | GUARANTY PROVISIONING VIA INTERNETWORKING - Disclosed herein are example embodiments for guaranty provisioning via internetworking. For certain example embodiments, at least one device, such as a server device of an internetworking service: (i) may detect at least one proffered guaranty transaction that is associated with at least one product transaction; or (ii) may proffer at least one guaranty based at least partially on at least one internetwork data stream. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 04-30-2015 |
20140349637 | FACILITATING WIRELESS COMMUNICATION IN CONJUNCTION WITH ORIENTATION POSITION - Disclosed herein are example embodiments for facilitating wireless communication in conjunction with orientation position. For certain example embodiments, at least one device, such as a fixed node: (i) may obtain one or more antenna assembly configuration parameters that are associated with at least one orientation position of at least one portable wireless node; or (ii) may manage one or more antenna assembly configuration parameters that are associated with at least one orientation position of at least one portable wireless node. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 11-27-2014 |
20140349569 | PORTABLE WIRELESS NODE AUXILIARY RELAY - Disclosed herein are example embodiments for portable wireless node auxiliary relay. For certain example embodiments, at least one device, such as an auxiliary relay item: (i) may serve as a relay between a portable wireless node and a fixed wireless node; or (ii) may communicate with at least one of a portable wireless node or a fixed wireless node using one or more antenna assembly configuration parameters that are associated with at least one orientation position. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 11-27-2014 |
20140347223 | PORTABLE WIRELESS NODE ORIENTATION ADJUSTMENT - Disclosed herein are example embodiments for portable wireless node orientation adjustment. For certain example embodiments, at least one device, such as a portable wireless node: (i) may detect a change in an orientation position of a portable wireless node; or (ii) may obtain at least one direction to aim at least one beam toward a counterpart wireless node. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 11-27-2014 |
20140303884 | AUTOMATED HAZARD HANDLING ROUTINE ACTIVATION - Disclosed herein are example embodiments for automated hazard handling routine activation. For certain example embodiments, at least one machine, such as an unoccupied flying vehicle (UFV), may: (i) detect at least one motivation to activate at least one automated hazard handling routine of the UFV; or (ii) activate at least one automated hazard handling routine of the UFV based at least partially on at least one motivation. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 10-09-2014 |
20140288813 | COLLISION TARGETING FOR AN UNOCCUPIED FLYING VEHICLE (UFV) - Disclosed herein are example embodiments for collision targeting for an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine, such as a UFV, may: (i) ascertain at least one target for at least one collision to include a UFV; or (ii) execute at least one maneuver to divert a UFV at least toward at least one target to induce at least one collision to include the UFV and the at least one target. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 09-25-2014 |
20140277834 | INTER-VEHICLE FLIGHT ATTRIBUTE COMMUNICATION FOR AN UNOCCUPIED FLYING VEHICLE (UFV) - Disclosed herein are example embodiments for inter-vehicle flight attribute communication for an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine may: (i) obtain at least one indication related to imparting at least one flight attribute corresponding to a UFV; or (ii) transmit to a remote UFV at least one indicator of at least one flight attribute corresponding to a UFV based at least partially on at least one indication related to imparting at least one flight attribute. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 09-18-2014 |
20140249741 | COLLISION TARGETING FOR HAZARD HANDLING - Disclosed herein are example embodiments for collision targeting for hazard handling. For certain example embodiments, at least one machine, such as a base station, may: (i) ascertain at least one target for at least one collision to include an unoccupied flying vehicle (UFV); or (ii) transmit at least one command to execute at least one maneuver to divert a UFV at least toward at least one target to induce at least one collision to include the UFV and the at least one target. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 09-04-2014 |
20140249692 | UNOCCUPIED FLYING VEHICLE (UFV) INTER-VEHICLE COMMUNICATION FOR HAZARD HANDLING - Disclosed herein are example embodiments for unoccupied flying vehicle (UFV) inter-vehicle communication for hazard handling. For certain example embodiments, at least one machine may: (i) receive one or more flight attributes from a remote UFV, with the one or more flight attributes indicative of one or more flight capabilities of the remote UFV; or (ii) adjust a flight path of a UFV based at least partially on one or more flight attributes received from a remote UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 09-04-2014 |
20140172194 | BASE STATION MULTI-VEHICLE COORDINATION - Disclosed herein are example embodiments for base station multi-vehicle coordination. For certain example embodiments, at least one machine, such as a base station, may: (i) effectuate one or more communications with at least a first UFV and a second UFV; or (ii) transmit to a first UFV at least one command based at least partially on one or more communications with at least a first UFV and a second UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-19-2014 |
20140172193 | BASE STATION CONTROL FOR AN UNOCCUPIED FLYING VEHICLE (UFV) - Disclosed herein are example embodiments for base station control for an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine, such as a base station, may: (i) obtain at least one indicator of at least one flight attribute corresponding to a first UFV; or (ii) transmit to a second UFV at least one indicator of at least one flight attribute corresponding to a first UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-19-2014 |
20140166817 | INTER-VEHICLE COMMUNICATION FOR HAZARD HANDLING FOR AN UNOCCUPIED FLYING VEHICLE (UFV) - Disclosed herein are example embodiments for inter-vehicle communication for hazard handling with an unoccupied flying vehicle (UFV). For certain example embodiments, at least one machine may: (i) receive one or more flight attributes from a remote UFV, with the one or more flight attributes indicative of one or more flight characteristics of the remote UFV; or (ii) adjust a flight path of a UFV based at least partially on one or more flight attributes received from a remote UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-19-2014 |
20140166816 | AUTOMATED HAZARD HANDLING ROUTINE ENGAGEMENT - Disclosed herein are example embodiments for automated hazard handling routine engagement. For certain example embodiments, at least one machine, such as an unoccupied flying vehicle (UFV), may: (i) detect at least one motivation to engage at least one automated hazard handling routine of the UFV; or (ii) engage at least one automated hazard handling routine of a UFV based at least partially on at least one motivation. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-19-2014 |
20140137271 | DATA SECURITY AND ACCESS TRACKING IN MEMORY - A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and data security logic integrated with the non-volatile memory array on the substrate. The data security logic is operable to perform at least one data security function associated with the non-volatile memory array. | 05-15-2014 |
20140137119 | MULTI-CORE PROCESSING IN MEMORY - A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and processing logic integrated with the non-volatile memory array on the substrate. The processing logic is operable to perform at least one general purpose processing function associated with the non-volatile memory array. | 05-15-2014 |
20140136915 | ERROR CORRECTION WITH NON-VOLATILE MEMORY ON AN INTEGRATED CIRCUIT - A memory device includes but is not limited to a non-volatile memory array and control logic integrated with and distributed over the non-volatile memory array. The control logic can be operable to maintain a plurality of copies of data in the non-volatile memory array and detect errors by comparison of selected ones of the plurality of copies. | 05-15-2014 |
20140136903 | REDUNDANCY FOR LOSS-TOLERANT DATA IN NON-VOLATILE MEMORY - A memory device includes a memory array including a plurality of memory sections characterized by a plurality of memory types and control logic integrated with and distributed over the memory array. The control logic is operable to selectively allocate redundant sections in the plurality of memory sections. | 05-15-2014 |
20140136755 | FLEXIBLE PROCESSORS AND FLEXIBLE MEMORY - An apparatus includes but is not limited to a non-volatile memory array and a processor integrated with the apparatus. The processor is operable to operate in combination with the non-volatile memory array to accumulate information associated with a product. In addition to the foregoing, other aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-15-2014 |
20140136754 | INTELLIGENT MONITORING FOR COMPUTATION IN MEMORY - A memory device can include a non-volatile memory array and control logic integrated with and distributed over the non-volatile memory array. The control logic can be operable to selectively distribute functionality across the non-volatile memory array. | 05-15-2014 |
20140136583 | RANDOM NUMBER GENERATOR FUNCTIONS IN MEMORY - A memory device includes but is not limited to a substrate, a non-volatile memory array integrated on the substrate, and random number generator logic integrated with the non-volatile memory array on the substrate. The random number generator logic is operable to perform at least one random number generator function in association with the non-volatile memory array. In addition to the foregoing, other aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 05-15-2014 |
20140123253 | Behavioral Fingerprinting Via Inferred Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-01-2014 |
20140123249 | Behavioral Fingerprinting Via Corroborative User Device - Disclosed herein are example embodiments for behavioral fingerprinting via corroborative user device. For certain example embodiments, one or more devices may (i) ascertain at least one indicator of a proximity of at least one corroborative user device that is affiliated with a behavioral fingerprint and (ii) incorporate the at least one indicator of a proximity of the at least one corroborative user device into an authentication-related analysis for a user device that is associated with the behavioral fingerprint. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 05-01-2014 |
20140040946 | DYNAMIC CUSTOMIZATION OF AUDIO VISUAL CONTENT USING PERSONALIZING INFORMATION - Systems and methods for dynamic customization of advertising content are described. In some implementations, a process may include obtaining at least one customization input based at least partially on a personalizing information corresponding to at least one user, modifying at least part of an audio-visual content in accordance with the at least one customization input to create a dynamically customized audio-visual content, and providing the dynamically-customized audio-visual content. | 02-06-2014 |
20140040945 | DYNAMIC CUSTOMIZATION OF AUDIO VISUAL CONTENT USING PERSONALIZING INFORMATION - Systems and methods for dynamic customization of advertising content are described. In some implementations, a process may include obtaining at least one customization input based at least partially on a personalizing information corresponding to at least one user, modifying at least part of an audio-visual content in accordance with the at least one customization input to create a dynamically customized audio-visual content, and providing the dynamically-customized audio-visual content. | 02-06-2014 |
20140040932 | METHODS AND SYSTEMS FOR VIEWING DYNAMICALLY CUSTOMIZED AUDIO-VISUAL CONTENT - Systems and methods for viewing dynamically customized audio-visual content are described. In some implementations, a process may include providing at least one selection signal indicative of a viewer preference, receiving a dynamically customized audio-visual content including an audio-visual core portion having at least one revised content portion customized in accordance with the at least one selection signal, displaying the dynamically-customized audio-visual content; and providing a consideration for the dynamically-customized audio-visual content. | 02-06-2014 |
20140040930 | METHODS AND SYSTEMS FOR VIEWING DYNAMICALLY CUSTOMIZED AUDIO-VISUAL CONTENT - Systems and methods for viewing dynamically customized audio-visual content are described. In some implementations, a process may include providing at least one selection signal indicative of a preference, receiving a dynamically customized audio-visual content including an audio-visual core portion at least partially modified with at least one revised content portion in accordance with the at least one selection signal, and displaying the dynamically-customized audio-visual content. | 02-06-2014 |
20140040039 | METHODS AND SYSTEMS FOR VIEWING DYNAMICALLY CUSTOMIZED ADVERTISING CONTENT - Systems and methods for dynamic customization of advertising content are described. In some implementations, a process may include providing at least one selection signal indicative of a viewer preference, receiving a dynamically customized audio-visual content including a dynamically customized advertising content portion having at least one revised content portion customized in accordance with the at least one selection signal, and displaying the dynamically-customized audio-visual content. | 02-06-2014 |
20130325447 | SPEECH RECOGNITION ADAPTATION SYSTEMS BASED ON ADAPTATION DATA - The instant application includes computationally-implemented systems and methods that include acquiring indication of a speech-facilitated transaction between a particular party and a target device, receiving adaptation data correlated to the particular party, the receiving facilitated by a particular device associated with the particular party, processing audio data from the particular party at least partly using the received adaptation data correlated to the particular party, and updating the adaptation data based at least in part on a result of the processed audio data, such that the updated adaptation data is configured to be transmitted to the particular device. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 12-05-2013 |
20130243275 | SYSTEMS, DEVICES, AND METHOD FOR DETERMINING TREATMENT COMPLIANCE INCLUDING TRACKING, REGISTERING, ETC. OF MEDICAL STAFF, PATIENTS, INSTRUMENTATION, EVENTS, ETC. ACCORDING TO A TREATMENT STAGING PLAN - Systems, devices, and methods are described for tracking, registering, etc. of medical staff, patients, instrumentation, events, or the like according to a treatment staging plan. For example a medical apparatus includes a right-patient verification device having an interrogation interface device that elicits at least one of identification data, authorization data, or treatment plan data from a medical procedure authorization device associated with a patient; and a right-site verification device that generates patient-specific treatment staging data consistent with the at least one of the identification data, the authorization data, or the treatment plan data. | 09-19-2013 |
20130197968 | BEHAVIORAL FINGERPRINTING WITH RETAIL MONITORING - Disclosed herein are example embodiments for behavioral fingerprinting with retail monitoring. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 08-01-2013 |
20130165161 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to accepting an indication of an inertial impact associated with at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. Additionally, systems and methods are described relating to means for accepting an indication of an inertial impact associated with at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on accepting the indication of the inertial impact associated with the at least one mobile device. | 06-27-2013 |
20130165160 | Computational Systems and Methods for Locating a Mobile Device - Systems and methods are described relating to determining a specified time period of non-movement in a mobile device and presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. Additionally, systems and methods are described relating to means for determining a specified time period of non-movement in a mobile device and means for presenting an indication of location of the mobile device at least partially based on the specified time period of non-movement. | 06-27-2013 |
20130160087 | BEHAVIORAL FINGERPRINTING WITH ADAPTIVE DEVELOPMENT - Disclosed herein are example embodiments for behavioral fingerprinting with adaptive development. For certain example embodiments, one or more devices may: (i) determine at least one indication of utilization for at least one authorized user via at least one user-device interaction; and (ii) incorporate at least one indication of utilization into at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130159413 | BEHAVIORAL FINGERPRINTING WITH SOCIAL NETWORKING - Disclosed herein are example embodiments for behavioral fingerprinting with social networking. For certain example embodiments, one or more devices may: (i) communicate for at least one interaction related to a user of a user device in a behavioral fingerprint habitat; or (ii) administer at least an aspect of at least one interaction related to a user of a user device in a behavioral fingerprint habitat. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130159217 | ENVIRONMENTALLY-RESPONSIVE BEHAVIORAL FINGERPRINTING - Disclosed herein are example embodiments for environmentally-responsive behavioral fingerprinting. For certain example embodiments, one or more devices may: (i) obtain at least one environmental parameter relating to an event to potentially occur in conjunction with at least one user device; or (ii) perform at least one analysis for the event based at least partially on the at least one environmental parameter and at least partially on at least one utilization indicator of a behavioral fingerprint that is associated with the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-20-2013 |
20130151617 | BEHAVIORAL FINGERPRINTING VIA SOCIAL NETWORK VERIFICATION - Disclosed herein are example embodiments for behavioral fingerprinting via social network verification. For certain example embodiments, one or more devices may (i) detect at least one attempt to perform at least one task via at least one user device; and (ii) initiate transmission of at least one verification inquiry to one or more social network connections based at least partly on the at least one attempt to perform the at least one task via the at least one user device. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth. | 06-13-2013 |
20130139257 | Deceptive indicia profile generation from communications interactions - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with one or more signals associated with communications content provided by the participant in a second communications interaction; generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction; and providing a notification associated with the deceptive indicia profile for the participant to the participant. | 05-30-2013 |
20130139256 | Deceptive indicia profile generation from communications interactions - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for generating deceptive indicia profiles may implement operations including, but not limited to: detecting one or more indicia of deception associated with one or more signals associated with communication content provided by a participant in a first communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with communications content provided by the participant in a second communications interaction; and generating a deceptive indicia profile for the participant according to indicia of deception detected in the communications content provided by the participant in the first communications interaction and indicia of deception detected in the communications content provided by the participant in the second communications interaction. | 05-30-2013 |
20130139255 | Detection of deceptive indicia masking in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for detecting masking of deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communications content provided by a first participant in a communications interaction; and detecting at least one indicia of a modification of the communications content associated with at least one indicia of deception by the first participant. | 05-30-2013 |
20130139254 | Deceptive indicia notification in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for monitoring deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communication content provided by a participant in a communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with the communication content; and providing a notification associated with the one or more indicia of deception associated with the communication content to the participant providing the communication content. | 05-30-2013 |
20130139253 | Deceptive indicia notification in a communications interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for monitoring deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communication content provided by a first participant in a communications interaction; detecting one or more indicia of deception associated with the one or more signals associated with the communication content; and providing a notification associated with the one or more indicia of deception associated with the communication content to a second participant in the communications interaction receiving the communication content. | 05-30-2013 |
20130138835 | Masking of deceptive indicia in a communication interaction - Systems, methods, computer-readable storage mediums including computer-readable instructions and/or circuitry for masking deceptive indicia in communications content may implement operations including, but not limited to: receiving one or more signals associated with communications content provided by a first participant in a communications interaction; modifying the communications content according to at least one indicia of deception; and providing communications content modified according to the at least one indicia of deception to a second participant in the communications interaction. | 05-30-2013 |
20130117214 | Behavioral Fingerprinting Via Derived Personal Relation - Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user. | 05-09-2013 |
20130085802 | Publication of efficiency and ecological impact data to a social media interface - Systems and methods for determining efficiency-of-use scores related to uses of a product by two or more users may implement operations including, but not limited to: computing at least one of an efficiency-of-use score and an environmental impact quantification according to data associated with a use of a physical product by a user over a period of time the user is indicated as having control of the physical product; and publishing the at least one of an efficiency-of-use score and an ecological impact quantification associated with the use of the product by the user to a social media interface. | 04-04-2013 |
20130061050 | Computational systems and methods for linking users of devices - Methods, apparatuses, computer program products, devices and systems are described that carry out accepting device-identifier data corresponding to at least one communication device; accepting network-participation identifier data associated with a verified real-world user associated with the at least one communication device; and assigning a unique identifier at least partly based on the device-identifier data and the network-participation identifier data. | 03-07-2013 |
20120330284 | Systems, devices, and methods to induce programmed cell death in adipose tissue - Systems, devices, and methods are described for registering treatment focal regions with adipose depot targets and for transcutaneously delivering an energy stimulus to the treatment focal regions when treatment registration information indicates that the treatment focal regions coincide with the anatomical targets. | 12-27-2012 |