Patent application number | Description | Published |
20100111114 | HIGH QUALITY TIMING DISTRIBUTION OVER DSL WITHOUT NTR SUPPORT - A method and system in which a Digital Subscriber Line Access Multiplexer (DSLAM) that is part of a DSL (Digital Subscriber Line) system is able to provide synchronous services to end user equipment connected to the DSLAM via a DSL link and Customer Premises Equipment (CPE). A sniffer device having direct or indirect access to a Primary Reference Clock (PRC) of the DSL system calculates the phase difference between the PRC and the DSLAM's Local Timing Reference (LTR). The phase difference is sent to the CPEs requiring accurate reference clock frequency. The CPEs are able to derive the PRC from the phase difference information transmitted by the sniffer device thus enabling synchronous end user equipment operation. | 05-06-2010 |
20110115534 | OPTICAL FREQUENCY SOURCE - A frequency reference, comprising: an optical waveguide closed on itself so that a light pulse inserted into the waveguide circulates therein; a light source coupled to the waveguide and controllable to generate a light pulse that circulates in the waveguide; and a detector coupled to a region of the waveguide that generates an output pulse each time the circulating light pulse passes the region. | 05-19-2011 |
20120063473 | HIGH QUALITY TIMING DISTRIBUTION OVER DSL WITHOUT NTR SUPPORT - A method and system in which a Digital Subscriber Line Access Multiplexer (DSLAM) that is part of a DSL (Digital Subscriber Line) system is able to provide synchronous services to end user equipment connected to the DSLAM via a DSL link and Customer Premises Equipment (CPE). A sniffer device having direct or indirect access to a Primary Reference Clock (PRC) of the DSL system calculates the phase difference between the PRC and the DSLAM's Local Timing Reference (LTR). The phase difference is sent to the CPEs requiring accurate reference clock frequency. The CPEs are able to derive the PRC from the phase difference information transmitted by the sniffer device thus enabling synchronous end user equipment operation. | 03-15-2012 |
20120275317 | TIMING OVER PACKET DEMARCATION ENTITY - Apparatus for monitoring a packet switched network, the apparatus comprising: at least one port for receiving and transmitting packets; a local clock; and a packet inspector that uses time from the local clock to timestamp packets received at a port of the at least one port, and additionally copies timing information from received timing distribution packets, which are transmitted from a master clock to a slave clock in order to discipline the slave clock, and forwards the received packets for transmission from a port of the at least one port; wherein the apparatus uses the timestamp of a received timing distribution packet and the copied timing information to monitor timing distribution performance of the network . | 11-01-2012 |
20140085141 | PLUGGABLE PACKET MASTER CLOCK - Apparatus for providing timing information, the apparatus comprising: a primary reference time clock (PRTC) that provides a reference time of day (ToD) and a reference frequency; a packet master clock that receives the ToD and reference frequency and is configured to distribute timing to a slave clock in accordance with a timing over packet procedure responsive to the ToD and the reference frequency; and a housing that houses the PRTC and packet master clock which may be plugged into a conventional small form factor (SFP) compliant cage to connect the packet master clock to a packet switched network (PSN). | 03-27-2014 |
20150023179 | TRIANGLE LOOPBACK - A method of characterizing a communications channel between two communications nodes, the method comprising: determining at least one feature of a communications path between a first communications node and a second communications node; determining at least one feature of a communications path between the first communications node and a third communications node; transmitting at least one packet from the first node to propagate through the second and third nodes and return to the first node; and determining at least one feature of the communications channel between the second and third nodes responsive to receiving the packet at the first node, the at least one determined feature of the first node and the second node, and/or information comprised in the packet. | 01-22-2015 |
20150180599 | TIMING OVER PACKET DEMARCATION ENTITY - Apparatus for synchronizing a local clock to a master clock, the apparatus comprising: at least one port for receiving and transmitting packets; a local clock; and a packet inspector that uses time from the local clock to timestamp packets received at a port of the at least one port, copies timing information from the received packets if the packets are timing distribution packets that are transmitted between a master clock and a slave clock in order to synchronize the slave clock to the master clock, and forwards the received packets for transmission from a port of the at least one port towards a packet destination that is not a packet source from where the packets originate, wherein the local clock uses the copied timing information and timestamps to synchronize the local clock to the master clock. | 06-25-2015 |
Patent application number | Description | Published |
20090208059 | Fast License Plate Verifier - A method for identifying vehicles, including capturing a first image of a first vehicle using a first camera at a first position and a second image of the first vehicle using a second camera at a second position different from the first position. The method further includes determining a transformation between the first image and the second image. A third image of a second vehicle using the first camera is captured, and the transformation is applied to the third image to generate a fourth image of the second vehicle. The fourth image is analyzed, using a database of identified vehicles, to determine an identity of the second vehicle. | 08-20-2009 |
20090212929 | Verifying Vehicle Authenticity - A method for verifying authenticity of a vehicle, including programming a device to sequentially change a device element to an altered device element according to a change device element algorithm, and attaching the device to the vehicle. The method also includes generating the altered device element, and verifying that the altered device element matches an expected device element generated by the algorithm. | 08-27-2009 |
20090273597 | USER INTERFACE SCREEN LAYOUT ANALYSIS USING HIERARCHICAL GEOMETRIC FEATURES - A technique is disclosed for the performance of application software “screen layout” testing analysis by designation of “fiduciary blocks” (e.g., words, boxes etc.) to serve as geometrical features for identification of data fields of interest viewed within a graphical user interface (GUI) screen. The set of designated “geometric fiduciary blocks” is then assembled into a “hierarchical structure” to analyze test results involving the data fields contained within each block. | 11-05-2009 |
20090316991 | Method of Gray-Level Optical Segmentation and Isolation using Incremental Connected Components - A novel and useful method of using Incremental Connected Components to segment and isolate individual characters in a gray-scale or color image. For each pixel intensity of pixels in the image, a plurality of pixel groups are created comprising contiguous pixels of intensity equal to or less than the current pixel intensity. The pixel groups are then input to a character classifier which returns an identified character and a confidence value. Non-overlapping pixel groups (i.e. segmentation) of identified characters having the highest confidence values are then selected. | 12-24-2009 |
20100074525 | Manipulating an Image by Applying a De-Identification Process - A method for manipulating an image, the method includes: capturing image information representative of an image that includes images of textual characters; recognizing the textual characters by applying Optical Character Recognition; identifying the layout of the image; and applying at least one de-identification process on textual characters of interest to provide de-identification process results. | 03-25-2010 |
20100166318 | ADAPTIVE PARTIAL CHARACTER RECOGNITION - A method and system for recognizing a character affected by a noise or an obstruction is disclosed. After receiving an image with characters, a character being affected by a noise or an obstruction is determined. Then, areas in the character where the noise or obstruction affected are precisely located. Templates representing every possible character in the image are updated by removing equivalent areas to the areas in the character being affected by the noise or obstruction. Then, the character is classified in a template among the updated templates by finding the template having the highest number of matching pixels with the character. | 07-01-2010 |
20110270794 | ADAPTIVE BUSINESS PROCESS AUTOMATION - A method, system, and computer program product are provided for process automation. The method includes: monitoring one or more workstations including monitoring screen contents and user actions at the workstation; and analysing the screen contents and user actions into monitored functional events. The method further includes: providing multiple focal states as defined sequences of functional events with one or more facilitating scripts associated with a focal state, wherein a facilitating script provides one or more automatic actions; and matching a sequence of monitored functional events to a defined sequence of functional events of a focal state. The one or more automatic actions of a facilitating script associated with the matched focal state are then applied. | 11-03-2011 |
20120296856 | Recognition Techniques to Enhance Automation In a Computing Environment - Systems and methods for detecting end of a transaction in a computing environment are provided. The method comprises determining a target area in a graphical user environment displayed on a display screen, wherein a change is expected to occur when end of a transaction is reached; masking the target area at least partially to remove content included in the target area that is present before or after the transaction was initiated; monitoring the target area for change in content; and detecting the end of the transaction when the content of the target area has changed. | 11-22-2012 |
20130011067 | ADAPTIVE PARTIAL CHARACTER RECOGNITION - A method and system for recognizing a character affected by a noise or an obstruction is disclosed. After receiving an image with characters, a character being affected by a noise or an obstruction is determined. Then, areas in the character where the noise or obstruction affected are precisely located. Templates representing every possible character in the image are updated by removing equivalent areas to the areas in the character being affected by the noise or obstruction. Then, the character is classified in a template among the updated templates by finding the template having the highest number of matching pixels with the character. | 01-10-2013 |
20130071017 | DETECTING ANTI-ALIASED TEXT IN DIGITAL IMAGES - A method, including automatically identifying, by a processor, a region of a digital image containing first pixels, each situated on a positive horizontal gradient, and second pixels in proximity to the first pixels, each situated on a negative horizontal gradient. A distribution of intensities of a color channel is then calculated for the pixels in the region, and the distribution is analyzed in order to detect whether the region contains anti-aliased text. | 03-21-2013 |
20130121580 | ANALYSIS OF SERVICE DELIVERY PROCESSES BASED ON INTERROGATION OF WORK ASSISTED DEVICES - A method of monitoring input devices to discover units of work and type of work includes recording uses of input devices of a computer, analyzing the recorded uses against pre-defined use patterns to determine sets of the recorded uses that correspond to one of a plurality of units of work, and outputting an indicator indicating which of the units of work have occurred. A method of accessing a call center includes performing speech to text transcription on audio recordings from the center, determining an identifier identifying an operator for a call from the text, estimating a phase of the call based on the text, recording ant entry including the identifier, the phase, and a time period of the phase, correlating the entry with another entry including information on an application run during the estimated phase to generate a correlated entry, and determining quality level of operator based on correlated entry. | 05-16-2013 |
20130124450 | ADAPTIVE BUSINESS PROCESS AUTOMATION - A method, system and computer software product are provided for process automation. The method includes monitoring one or more workstations to obtain multiple sets of character and graphical information including user actions, times and durations associated with the user actions, user-entered data, and retrieved character and graphical screen data. The method further includes identifying functional events from the sets, defining focal states as respective historic patterns of the functional events, and generating a set of facilitating scripts associated with respective ones of the focal states. The facilitating scripts each provide one or more automatic actions in the workstations. At least a portion of the set of facilitating scripts are then executed. | 05-16-2013 |
20130339836 | Compliance Verification Using Field Monitoring in a Computing Environment - Systems and methods for enforcing compliance in a computing environment, the method comprising concurrently and independently executing a monitoring application with a first application utilized by a user, wherein navigating beyond a first decision point in the first application requires the user considering values associated with one or more elements in the first application, wherein the monitoring application monitors elements presented to the user to determine which elements are presented to the user at a point in time; and notifying the user of at least a first element, in response to not having been able to confirm whether a value associated with the first element has been considered by the user prior to said first decision point. | 12-19-2013 |
20140101660 | Recognition Techniques to Enhance Automation In a Computing Environment - Systems and methods for detecting end of a transaction in a computing environment are provided. The method comprises determining a target area in a graphical user environment displayed on a display screen, wherein a change is expected to occur when end of a transaction is reached; masking the target area at least partially to remove content included in the target area that is present before or after the transaction was initiated; monitoring the target area for change in content; and detecting the end of the transaction when the content of the target area has changed. | 04-10-2014 |
20140307969 | AUTOMATED APPLICATION INTERACTION USING A VIRTUAL OPERATOR - A computer-implemented method for automating interaction with a computer system includes linking a control computer system to an input interface and to an output interface of a client computer system, which is operative for producing user interface images on a display device. The control computer system executes distinct software modules that include a virtual operator for simulating actions of a human operator. Execution of the software modules causes the control computer system to capture an image from the output interface, and to recognize information in the image. In response to the information, the virtual operator controls an input device to automatically execute predetermined operations on the client computer system via the input interface. | 10-16-2014 |
20140320514 | Text Extraction From Graphical User Interface Content - Systems and methods for extracting text from images rendered on a display screen, the method comprising capturing a color image rendered on a display screen; and transforming the color image to binary color image, preserving text-like graphic components and filtering out non-text-like graphical components. The transforming comprises scanning one or more areas of the color image; and detecting continuous bi-tonal regions in the scanned one or more areas, wherein the continuous bi-tonal regions have large variances. | 10-30-2014 |
20140325409 | Active & Efficient Monitoring of a Graphical User Interface - Machines, systems and methods for recognizing visual change in a graphical user interface (GUI) environment, the method comprising determining position of an active GUI object in the GUI environment based on known attributes of the active GUI object; monitoring a focus area in the active GUI object to detect visual changes in attributes of the focus area, without regard to any visual changes outside the focus area; determining whether the active GUI object has moved or has been resized, in response to determining a visual change in the attributes of the focus area; and determining position of a new active GUI object in the GUI environment, in response to determining that the active GUI object has not been moved or has not been resized. | 10-30-2014 |
20150023599 | Optical Match Character Classification - Machines, systems and methods for enhanced optical character recognition are provided. In one embodiment, the method comprises identifying a sample character in a textual context to be optically recognized; comparing the sample character with a template character, wherein the sample character is scaled into a first grid and the template character is scaled into a second grid; identifying one or more pixels in the sample character within the first grid and one or more pixels in the template character in the second grid, wherein the one or more pixels are identified as belonging to a foreground category in the textual content, a foreground pixel having at least N gradients corresponding to edges of the foreground pixel that are juxtaposed to a neighbor pixel, wherein a contour foreground pixel has at least one gradient that is neighbored by a background pixel in the textual context. | 01-22-2015 |
20150220716 | BIOMETRIC AUTHENTICATION - A method comprising using at least one hardware processor for: providing a set of development supervectors representing features of biometric samples of multiple subjects, the biometric samples being of at least a first and a second different biometric modalities; providing at least a first and a second enrollment supervectors representing features of at least a first and a second enrollment biometric samples of a target subject correspondingly, wherein the at least first and second enrollment samples are of the at least first and the second different biometric modalities correspondingly; providing at least a first and a second verification supervectors representing features of at least a first and a second verification biometric samples of the target subject correspondingly, wherein the at least first and second verification samples are of the at least first and second different biometric modalities correspondingly; concatenating the development supervectors to a set of development generic supervector, the at least first and second enrollment supervectors to a single enrollment generic supervector and the at least first and second verification supervectors to a single verification generic supervector; and verifying an identity of the target subject based on a fused score calculated for the verification generic supervector, wherein the fused score is calculated based on the enrollment generic supervector and the set of development generic supervectors. | 08-06-2015 |
Patent application number | Description | Published |
20110004115 | FUNCTIONAL ANALYSIS OF NEUROPHYSIOLOGICAL DATA - A method for functional analysis of neurophysiological data by decomposing neurophysiological data and EEG signal to form a plurality of signal features. The signal features may then optionally be analyzed to determined one or more patterns. | 01-06-2011 |
20110004412 | CLINICAL APPLICATIONS OF NEUROPSYCHOLOGICAL PATTERN ANALYSIS AND MODELING - A method for functional analysis of neurophysiological data by decomposing neurophysiological data and EEG signal to form a plurality of signal features. The signal features may then optionally be analyzed to determined one or more patterns. | 01-06-2011 |
20110022548 | SYSTEM AND METHOD FOR NEURAL MODELING OF NEUROPHYSIOLOGICAL DATA - Systems and methods for constructing a neural model, wherein the system and method comprises analyzing neuropsychological data to obtain the model and modeling functional plasticity. | 01-27-2011 |
20120296569 | METHOD AND SYSTEM FOR WEIGHTED ANALYSIS OF NEUROPHYSIOLOGICAL DATA - A method of analyzing neurophysiological data is disclosed. The method comprises: identifying activity-related features in the data, constructing a brain network activity (BNA) pattern having a plurality of nodes, each representing a feature of the activity-related features, and assigning a connectivity weight to each pair of nodes in the BNA pattern. | 11-22-2012 |
20130080127 | NEUROPSYCHOLOGICAL SPATIOTEMPORAL PATTERN RECOGNITION - Systems and methods for identifying and analyzing neuropsychological flow patterns, include creating a knowledge base of neuropsychological flow patterns. The knowledge base is formed by obtaining signals from multiple research groups for particular behavioral processes, localizing sources of activity participating in the particular behavioral processes, identifying sets of patterns of brain activity for the behavioral processes and neuropsychologically analyzing the localized sources and the identified patterns for each of the research groups. The neuropsychological analysis includes identifying all possible pathways for the identified sets of patterns, ranking the possible pathways based on likelihood for the particular behavioral process and reducing the number of ranked possible pathways based on additional constraints. A system for comparison of obtained signals from an individual to the created knowledge base is provided. These obtained signals are then used to further update the existing knowledge base. | 03-28-2013 |
20140163328 | METHOD AND SYSTEM FOR ESTIMATING BRAIN CONCUSSION - A method of estimating the likelihood of brain concussion from neurophysiological data acquired from the brain of the subject is disclosed. The method comprises: identifying activity-related features in the data; constructing a subject-specific brain network activity (BNA) pattern having a plurality of nodes, wherein each node represents a feature of the activity-related features, and each pair of nodes is assigned with a connectivity weight; calculating a BNA pattern similarity describing a comparison between the constructed BNA pattern and a baseline BNA pattern being specific to the subject; and assessing the likelihood of brain concussion responsively to the BNA pattern similarity. | 06-12-2014 |
20140214730 | SYSTEM AND METHOD FOR NEURAL MODELING OF NEUROPHYSIOLOGICAL DATA - Systems and methods for constructing a neural model, wherein the system and method comprises analyzing neuropsychological data to obtain the model and modeling functional plasticity. | 07-31-2014 |
20150305685 | NEUROPSYCHOLOGICAL SPATIOTEMPORAL PATTERN RECOGNITION - Systems and methods for identifying and analyzing neuropsychological flow patterns, include creating a knowledge base of neuropsychological flow patterns. The knowledge base is formed by obtaining signals from multiple research groups for particular behavioral processes, localizing sources of activity participating in the particular behavioral processes, identifying sets of patterns of brain activity for the behavioral processes and neuropsychologically analyzing the localized sources and the identified patterns for each of the research groups. The neuropsychological analysis includes identifying all possible pathways for the identified sets of patterns, ranking the possible pathways based on likelihood for the particular behavioral process and reducing the number of ranked possible pathways based on additional constraints. A system for comparison of obtained signals from an individual to the created knowledge base is provided. These obtained signals are then used to further update the existing knowledge base. | 10-29-2015 |
20160038049 | NEUROPHYSIOLOGICAL DATA ANALYSIS USING SPATIOTEMPORAL PARCELLATION - A method of analyzing neurophysiological data recorded from a subject is disclosed. The method comprises identifying activity-related features in the data, and parceling the data according to the activity-related features to define a plurality of capsules, each representing a spatiotemporal activity region in the brain. The method further comprises comparing at least some of the defined capsules to at least one reference capsule, and estimating a brain function of the subject based on the comparison. | 02-11-2016 |
20160051163 | CLASSIFYING EEG SIGNALS IN RESPONSE TO VISUAL STIMULUS - Systems and method for classifying EEG signals of a human subject generated responsive to a series of images containing target images and non-target images. The EEG signals are in a spatio-temporal representation. The time points are classified independently, using a linear discriminant classifier, to compute spatio-temporal discriminating weights that are used to amplify the spatio-temporal representation, to create a spatially-weighted representation. Principal Component Analysis is used on a temporal domain for dimensionality reduction, separately for each spatial channel of the signals, to create a projection, which is applied to the spatially-weighted representation onto a first plurality of principal components, to create a temporally approximated spatially weighted representation. The temporally approximated spatially weighted representation is classified over the channels, using said linear discriminant classifier, to yield a binary decisions series indicative of each image of the images series as either belonging to said target image or to said non-target image. | 02-25-2016 |
Patent application number | Description | Published |
20110009711 | METHOD AND SYSTEM FOR HEALTH MONITORING - A personal health monitor, including: (a) a physiological data input device operative to gather physiological data; and (b) a multi-purpose personal data accessory, whereas the multi-purpose personal data accessory is adapted to execute health monitoring software such as to enable the multi-purpose personal data accessory to receive the physiological data, process the physiological data to provide processed physiological data and control a long range transmission of the processed physiological data to a remote entity; wherein the physiological data input device controls a transmission of the physiological data to the multi-purpose personal data accessory. | 01-13-2011 |
20120165616 | PORTABLE MONITORING UNIT AND A METHOD FOR MONITORING A MONITORED PERSON - A method and portable monitoring unit, that portable monitoring unit includes a memory module for storing a media clip that comprises instructions related to the operation of the monitoring unit, for storing raw medical information, and for storing medical event information; a processor arranged to receive raw medical information from at least one primary sensor and to process the raw medical information and detect potential medical events, to trigger a display of the media clip and to perform a potential event related operation in response to a detection of the potential medical event. | 06-28-2012 |
20130070043 | VEHICLE DRIVER MONITOR AND A METHOD FOR MONITORING A DRIVER - A method and a monitor for monitoring a driver of a vehicle, the monitor includes: multiple sensors coupled to at least one vehicle element or integrated with at least one vehicle element; a processor for: receiving physiological information relating to the driver from the multiple sensors; detecting, based on the physiological information, a health problem of the driver, an awareness level of the driver and a stress level of the driver; determining a selected action to be performed based on the detection, wherein the action is selected from a list consisting of: establishing a call to a remote assistance site, transmitting the physiological information to a remote assistance site, generating an audio alert, and generating a visual alert; and assisting in a completion of the selected action. | 03-21-2013 |
20130120157 | ADHESIVE BANDAGE AND A METHOD FOR CONTROLLING PATIENT INFORMATION - An adhesive bandage that includes: a thin sheet having an underside provided with a self adhesive; a wireless transmitter; a memory unit, coupled to the wireless transmitter, for storing a patient identifier and for storing patient data that comprises measurement thresholds, vital signs measurements and treatment data; a monitor, coupled to the memory unit, for monitoring vital signs and for generating the vital signs measurements; a wireless receiver for receiving requests to obtain requested patient data; an alert generator, coupled to the memory unit, for generating an alert if a vital sign measurement reached an associated measurement threshold; and a processor, coupled to the wireless transmitter, to the wireless receiver and to the memory unit, for determining whether to transmit, by the wireless transmitter, the requested patient data and the patient identifier, and for determining whether to transmit, by the wireless transmitter, the alert and the patient identifier; and wherein at least one component out of the processor, the alert generator, the wireless transmitter, the memory, the monitor, the memory unit and the wireless receiver is connected to the thin sheet. | 05-16-2013 |
20140035750 | MULTI LEVEL HAZARD DETECTION SYSTEM - A multi level hazard detection system for home residents or owners or service providers that want to efficiently monitor and detect numerous common hazards in houses, offices or industrial structures. Hazards that may be dangerous their health or to the structural integrity of their houses, offices and industrial structures and all appliances and systems that are of these structures such as heating and cooling systems, pipes and more. By detecting hazards in advance, residents home owners and service providers can better protect their property. The multi level hazard detection system generally includes Single or Multi Sensor Device ( | 02-06-2014 |
20140058680 | SYSTEM AND A METHOD FOR PHYSIOLOGICAL MONITORING - A personal health monitor, including: (a) a physiological data input device operative to gather physiological data; (b) a detachable module that is detachably connected to a multi-purpose personal data accessory, operative to transmit the physiological data to the multi-purpose personal data accessory; and (c) the multi-purpose personal data accessory, whereas the multi-purpose personal data accessory is adapted to execute health monitoring software such as to enable the multi-purpose personal data accessory to receive the physiological data, process the physiological data to provide processed physiological data and control a long range transmission of the processed physiological data to a remote entity. | 02-27-2014 |
20150094556 | DETACHABLE ELECTROCARDIOGRAPEY DEVICE - An electrocardiographic system, the electrocardiographic system includes a first part that includes: a first housing that comprises of a first bottom layer that is elastic and has an underside provided with an adhesive material; a first set of electrodes that is located within the first housing; wherein the first set of electrodes comprises at least one first electrode; a second part that comprises: a second housing that comprises a second bottom layer that has an underside provided with an adhesive material; a second set of electrodes that are located within the second housing; wherein the second set of electrodes comprises at least one second electrode; a mechanical adaptor that is arranged to be detachably connected to a electrocardiographic device that comprises a processor and a wireless transmitter; and an electrical connector that is detachably is arranged to be detachably connected to the electrocardiographic device and to electrically couple the electrocardiographic device to conductors that convey signals from the first and second sets of electrodes. | 04-02-2015 |
Patent application number | Description | Published |
20120295645 | DELAYED AND TIME-SPACE BOUND NOTIFICATIONS - Architecture that enables alerts and notifications to have priorities and time/space durations. Non-critical alerts can be displayed in a non-obtrusive manner and alert/notifications coalesced. Alerts/notifications can be assigned priorities, thereby enabling the alerts/notifications to be non-intrusive to the user. Methods include detecting when the user is using a mobile phone (or other suitable device) and then sending the alert/notification in response to the detected use based on threshold criteria relative to an accumulated sum of alerts/notifications, and an importance level (e.g., of each). Additionally, alert/notification priority can be changed (e.g. elevated, lowered) according to time (when) and space (where), thereby enabling the user to be intrusively notified based on the level, even if not previously signaled. Time and space bounds (criteria) can be assigned to alerts/notifications for merger/grouping and/or set to be auto-dismissed if no longer applicable. | 11-22-2012 |
20120306660 | ADAPTATION OF NOTIFICATION PERIMETER BASED ON RELEVANCE TO A USER - Location-based notification architecture that provides notification relevance to a user and/or a user goal. The size of the virtual perimeter or boundary is changed dynamically based on changes in relevance to a user and/or user goal, and thus, can be made dependent on various factors. The size of the perimeter can increase or decrease according to user preferences that are learned over time (e.g., preference for a gas station of a specific company). These capabilities improve the relevance of the notification the user receives. The relevance of a notification to the user can be improved by tuning the perimeter size according to known parameters that depend on the point of interest (e.g., business) itself and/or by tuning of the size of virtual perimeter according to parameters associated with user behavior. Other parameters can be considered as well, such as environmental conditions, and traffic conditions, for example. | 12-06-2012 |
20120316774 | AUTOMATIC NAVIGATION TO A PRIOR KNOWN LOCATION - The disclosed architecture facilitates the capture of data associated with a specific geographic location, as captured by a mobile device of a user at the geographic location, for the purpose of guiding the user back to that specific geographic location. When applied to vehicles or other types of user mobility (e.g., walking) the architecture automatically detects that a user has controlled a means of transportation to a stationary (or parked) state, such as associated with a parked car. When the stationary state is reached, the location is detected (e.g., using user device sensing systems). Detection can include recording images, sounds, speech, geolocation data, etc., associated with the location and/or means of transportation. The user can configure a reminder to activate at the location to assist in the user recalling the location when returning to the means of transportation. | 12-13-2012 |
20120317205 | ANONYMOUS LOCATION-BASED NOTIFICATION - Architecture that enables communication of a message from a requesting (sending) user to a single target user and/or group of target users based on current geographic location of the target user(s) while hiding the identities of the requesting user and the target user(s). This anonymity capability is provided by mediating messages between the users (requesting and target) via an anonymous messaging component (e.g., a service) that maintains anonymity of the users relative to one another. The anonymous messaging component does not publish user identities, since the component mediates between the sender and the receiver(s). | 12-13-2012 |
20120317615 | USE OF USER LOCATION INFORMATION FOR REMOTE ACTIONS - Architecture that provides location broker services which share the user location with other parties (e.g., based on user consent). Stationary computing devices can also determine the location of the user operator and interact accordingly. In one embodiment, the user location is retrieved from the user mobile device (e.g., smart phone) and is transmitted to other mobile or non-mobile devices with which the user interacts. Moreover, existing infrastructure and systems can be employed using a device driver that emulates the user location so that any software that uses the location services does not need modification. | 12-13-2012 |