Patent application number | Description | Published |
20130267264 | PROCESSING CELLULAR TELEPHONE SUBSCRIPTION FOR E-MAIL THREADS - A method and system for processing a subscription to an e-mail message thread. Short Message Service (SMS) data is assigned to a mobile device. Both a telephone number associated with the mobile device and the assigned SMS data are assigned to a setting in a database stored in an e-mail message server. A subscription to updates related to an e-mail message thread associated with the e-mail message server is created. The creation of the subscription includes correlating the telephone number and the SMS data to a unique e-mail message thread identifier of the e-mail message thread. The updates related to the e-mail message thread are sent to the mobile device via the e-mail message server. | 10-10-2013 |
20140081748 | CUSTOMIZED TELEVISION COMMERCIALS - A method of presenting a commercial to a viewer by a media player includes downloading, by the media player, a data portfolio from a remote server, wherein the data portfolio comprises a plurality of commercials and a viewing strategy, determining, by the media player, whether one of the commercials has been viewed previously by a same viewer, and presenting, by the media player, an other one of the commercials based on the viewing strategy. | 03-20-2014 |
20140081749 | CUSTOMIZED TELEVISION COMMERCIALS - A media player includes a memory device storing a computer program, a processor configured to execute the computer program, and network interface configured to enable communications between the media player and a network. The program is configured to download a data portfolio from a remote server across the network, determine whether one of a plurality of commercials included within the data portfolio has been viewed previously by a same viewer, and output an other one of the commercials based on a viewing strategy included within the data portfolio. | 03-20-2014 |
20140090032 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 03-27-2014 |
20140090040 | SYSTEM AND METHOD FOR REAL TIME SECURE IMAGE BASED KEY GENERATION USING PARTIAL POLYGONS ASSEMBLED INTO A MASTER COMPOSITE IMAGE - A method including: receiving, at a first device, a challenge provided from a second device, wherein the challenge includes an encoding algorithm and a request for credentials from the first device; and outputting, from the first device to the second device, a response to the challenge, wherein the response includes at least one image, the at least one image including an article of evidence arranged according to the encoding algorithm. | 03-27-2014 |
20140181636 | Detection and Repositioning of Pop-up Dialogs - An embodiment of the invention provides a method where a file is displayed on a display screen of a mobile device; and, a pop-up is identified outside of the visible area on the display screen of the mobile device. The identification of the pop-up includes detecting a document object model change in the file, the presence of one or more non-active elements in the file, and/or a change in luminance in an area outside of the visible area on the display screen. A controller moves the pop-up to the visible area on the display screen, or the visible area on the display screen is moved to the pop-up. | 06-26-2014 |
20140181638 | Detection and Repositioning of Pop-up Dialogs - An embodiment of the invention provides a method where a file is displayed on a display screen of a mobile device; and, a pop-up is identified outside of the visible area on the display screen of the mobile device. The identification of the pop-up includes detecting a document object model change in the file, the presence of one or more non-active elements in the file, and/or a change in luminance in an area outside of the visible area on the display screen. A controller moves the pop-up to the visible area on the display screen, or the visible area on the display screen is moved to the pop-up. | 06-26-2014 |
20140195445 | SYSTEM AND METHOD FOR COMPLIANCE RISK MITIGATION - An approach for handling a complain issue due to absence is provided. The approach includes a computer system identifying a compliance issue. The computer system attributes the compliance issue to a first employee availability. In addition, the computer system identifies a deadline for resolving the compliance issue. Furthermore, the computer system mitigates the compliance issue based on the first employee availability and identified deadline | 07-10-2014 |
20140304619 | IDENTIFYING INTENDED COMMUNICATION PARTNERS IN ELECTRONIC COMMUNICATIONS - An apparatus, computer program product, and method for assisting communication with an intended communication partner. The apparatus may include a user interface and at least one computer processor. The computer processor initiates a communication session with a first contact. The processor identifies at least one second contact that has a potential to be confused with the first contact and highlights at least one difference between the first contact and the second contact in the user interface. | 10-09-2014 |
20140304621 | IDENTIFYING INTENDED COMMUNICATION PARTNERS IN ELECTRONIC COMMUNICATIONS - An apparatus, computer program product, and method for assisting communication with an intended communication partner. The apparatus may include a user interface and at least one computer processor. The computer processor initiates a communication session with a first contact. The processor identifies at least one second contact that has a potential to be confused with the first contact and highlights at least one difference between the first contact and the second contact in the user interface. | 10-09-2014 |
20140324329 | SAFE DISTANCE DETERMINATION - A method includes, a first computer determining a stopping distance information for a first vehicle; broadcasting the stopping distance information for the first vehicle to at least one other vehicle; a second computer, in the at least one other vehicle, receiving the stopping distance information for the first vehicle determines a first distance between the at least one other vehicle and the first vehicle; and the second computer determining a proper distance for the at least one other vehicle based on the received stopping distance information of the first vehicle. | 10-30-2014 |
20140337316 | INFORMATIVE COMMUNICATION HISTORY - An approach for retrieving and storing telephone numbers along with related contextual information associated with inbound/outbound communications to/from a device. The approach includes a method that includes combining, by at least one processing device, identification information of an entity and a related communication mechanism used to initiate a communication to a device. The method further includes providing, by the at least one processing device, a soft record that includes the identification information and the related communication mechanism. | 11-13-2014 |
20140343796 | Detect Driver Persona in a Vehicle - An embodiment of the invention provides a method and system for detecting driver persona in a vehicle wherein an attribute of a user is identified via at least one sensor in the interior of the vehicle. The attribute of the user can include the body weight of the user and/or a sequence of activities performed by the user when entering the vehicle. An electronic storage device is queried with the attribute of the user to determine whether the attribute of the user matches a stored driver attribute. The electronic storage device includes one or more driver profiles that include one or more driver attributes and stored driver settings. Driver settings are set in the vehicle with a processor based on the stored driver settings when the attribute of the user matches a stored driver attribute in the electronic storage device. | 11-20-2014 |
20140380491 | ENDPOINT SECURITY IMPLEMENTATION - A method includes a computer detecting an element from a data flow for at least one endpoint device; the computer using the detected element and a protection engine to assess security requirements for the flow of data for the at least one endpoint device; and the computer causing the protection engine to issue additional security controls for the at least one endpoint device. | 12-25-2014 |
20150025690 | HIVE OF SMART DATA CENTER TILES - A smart tile system and methodology, each tile having a sensor device and control unit for monitoring an environmental condition of a room or space. A plurality of smart tiles form a hive community resulting in a tightly coupled sensor network configured to communicate in clusters and collaborate to accomplish missions. One of the missions is environmental control which is communicated to a tile in the form of a policy. The tiles around one piece of equipment in the room or space may control the regulating of cooling/heating for just that one piece of equipment allowing little to not impact of other equipment(s) in the room. The smart tile of the hive communicate over a mesh network protocol, and one or more smart tiles comprise a vent under actuator control wherein the tile is configured to receive commands to adjust the vent opening according to a desired setting. | 01-22-2015 |
20150032609 | CORRELATION OF DATA SETS USING DETERMINED DATA TYPES - A computer receives a data set and determines the data type of the column data within. The computer identifies a second data set with columns of the same data type. The computer compares the contents of the columns and the formatting of the contents to determine a score representative of the relevancy of the data sets to one another. Responsive to the score exceeding a threshold, the computer suggests the second data set to a user. | 01-29-2015 |
20150046969 | ADJUSTING MULTI-FACTOR AUTHENTICATION USING CONTEXT AND PRE-REGISTRATION OF OBJECTS - A system and method and computer program product for user authentication that uses information about a user's context or context of their personal device(s) to dynamically modify that user's authentication or login requirements to an application in a computer or mobile device. The system is configured to run methods that detect and make use of a user's context that includes: a current environment or personal context, and uses this capability to enable variable strength authentication when attempting to log in or enter another application or resource. In one embodiment, the system implements methods to dynamically adjust the authentication challenge as a differential of all accumulated user contexts (e.g., providing a shorter password or pin-code). | 02-12-2015 |