Patent application number | Description | Published |
20120289277 | PRIVACY CONTROL IN PUSH-TO-TALK - In one embodiment, a computer program product for suppressing incoming audio in a Push-To-Talk (PTT) session includes a computer readable storage medium having computer readable program code embodied therewith, the computer readable program code including computer readable program code configured for receiving a request sent from an originator communication device to initiate a PTT session at a receiver communication device, computer readable program code configured for establishing the PTT session between the originator communication device and the receiver communication device, computer readable program code configured for notifying a user at the receiver communication device that the PTT session has been established, computer readable program code configured for determining whether to suppress or audibilize incoming audio based on a privacy setting on the receiver communication device, and computer readable program code configured for suppressing or audibilizing the incoming audio according to the privacy setting. | 11-15-2012 |
20120290664 | CROSS-MEDIA, CROSS-CHANNEL, CROSS-PROTOCOL, AND CROSS-NETWORK CAPABLE AUTOREPLY WITHIN A SINGLE APPLICATION - According to one embodiment, a communication device capable of cross-media, cross-channel, cross-protocol messaging within a first application includes a processor adapted for executing logic, logic adapted for receiving an incoming message using the first application, logic adapted for notifying a user of the incoming message using the first application, logic adapted for processing the incoming message using the first application to determine details of the incoming message, logic adapted for determining to generate an autoreply to the incoming message using the first application, logic adapted for generating the autoreply to the incoming message using the first application, and logic adapted for sending the autoreply using the first application to at least a communication device which generated the incoming message. Other systems, methods, and computer program products for autoreplying are presented according to more embodiments. | 11-15-2012 |
Patent application number | Description | Published |
20130260259 | FLEXIBLE SOLID-STATE CONDUCTORS - Various embodiments of solid-state conductors containing solid polymer electrolytes, electronic devices incorporating the solid-sate conductors, and associated methods of manufacturing are described herein. In one embodiment, a solid-state conductor includes poly(ethylene oxide) having molecules with a molecular weight of about 200 to about 8×10 | 10-03-2013 |
20140212768 | FLEXIBLE SOLID STATE CONDUCTORS INCLUDING POLYMER MIXED WITH PROTEIN - Various embodiments of solid-state conductors containing solid polymer electrolytes, electronic devices incorporating the solid-sate conductors, and associated methods of manufacturing are described herein. In one embodiment, a solid-state conductor includes poly(ethylene oxide) having molecules with a molecular weight of about 200 to about 8×10 | 07-31-2014 |
20160028112 | GUM-LIKE ELECTROLYTES AND METHODS OF MAKING THE SAME - A gum like electrolyte composition and methods for making the composition are disclosed herein. The gum-like electrolyte composition may include a mixture of at least one wax particle, at least one electrolyte, and a polymer matrix comprising at least one polymer, wherein the wax particle and the electrolyte are dispersed in the polymer matrix, and wherein mixture is a malleable material. | 01-28-2016 |
20160104554 | FUNCTIONALIZED POROUS POLYMER NANOCOMPOSITES - Porous polymer nanocomposites with controllable distribution/dispersion of components are provided. These nanocomposites are useful for various applications, such as flexible 3D electrodes for batteries, flexible sensors and conductors and the like. Also provided are emulsion compositions and methods for preparing the porous polymer nanocomposites. | 04-14-2016 |
Patent application number | Description | Published |
20140274354 | INTELLIGENT MERCHANDISING OF GAMES - User activity with respect to media content, such as games, may be tracked and collected. Data associated with the user activity may be utilized to generate one or more predictive models, which may determine correlations between users that accessed the media content, the media content, or genres relating to the media content. Additional media content may be recommended and/or promoted to users based at least in part on the correlations and/or the likelihood that the additional content would be of interest to the users. The additional content may be presented to the users via one of multiple communication channels, such as an application associated with a user device, a site associated with the additional content, via messages transmitted to the users, and/or any other manner of communicating the additional content. | 09-18-2014 |
20140274355 | DYNAMIC RECOMMENDATION OF GAMES - A user may utilize a user device to interact with a plurality of games via an application stored on the user device and/or a site associated with the plurality of games. The user may also select at least one of the plurality of games to view, try, play, download, install, and/or acquire. In response to a user selection of at least one of the plurality of games, one or more additional games may be dynamically presented and/or recommended to the user. The one or more additional games may be determined to have a higher likelihood of being of interest to the user. An area in which the one or more additional games are presented to the user may be persistently displayed to the user via a display of the user device. | 09-18-2014 |
20140279121 | CUSTOMIZABLE AND ADJUSTABLE PRICING OF GAMES - One or more games may be accessed by a plurality of user devices. A current geographic location of a user device or a geographic location associated with the user device may be detected. A language associated with the one or more games and/or a type of currency of a rate associated with the one or more games may be customized based at least in part on the current geographic location and/or the geographic location. An identity of a user associated with the user device may also determined. Based at least in part on the identity of the user, the rate associated with the one or more games may be dynamically adjusted. | 09-18-2014 |
Patent application number | Description | Published |
20090158384 | DISTRIBUTION OF INFORMATION PROTECTION POLICIES TO CLIENT MACHINES - One embodiment includes a method which may be practiced in a computing environment where resources are distributed. The method includes acts for obtaining policy information defining restrictions on resources distributed in the computing environment. The method includes sending a request to a server for metadata about one or more resource protection policies at the server. In response to the request, metadata about one or more resource protection polices at the server is received from the server. The metadata from the server is analyzed. Based on analyzing the metadata, one or more resource protection policies stored at the client are updated. | 06-18-2009 |
20090192942 | PRE-PERFORMING OPERATIONS FOR ACCESSING PROTECTED CONTENT - The present invention extends to methods, systems, and computer program products for pre-performing operations for accessing protected content. Cryptographic user key pairs can be pre-generated and distributed in response to a variety of different events prior to provisioning client machine for accessing protected content. Usage licenses can be pre-generated and allocated prior to requests for usage licenses. Usage licenses can be pre-obtained for client machines prior to client machines access protected content. Pre-performed operations can be performed in response to detected events, such as, for example, reduced resource consumption in a Digital Rights Management system. | 07-30-2009 |
20090260054 | Automatic Application of Information Protection Policies - The secure application of content protection policies to content. The secure application of content protection polices is accomplished by having an enforcement mechanism monitor policy application points to detect the transfer of content. The enforcement mechanism accesses the content and a determination is made to protect the content. A usage policy is then identified by the enforcement mechanism to apply to the content and the usage policy is then applied to the content, resulting in a usage policy for the content. | 10-15-2009 |
20100306535 | Business To Business Secure Mail - Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users. | 12-02-2010 |
20120079268 | SEPARATING AUTHORIZATION IDENTITY FROM POLICY ENFORCEMENT IDENTITY - The present invention extends to methods, systems, and computer program products for separating authorization identity from policy enforcement identity. Embodiments of the invention extend the consumption phase for protected information. Two identities, an authorization identity and a policy enforcement identity, are used for acquiring, issuing and enforcing usage license instead of one identity certificate. The authorization identity is used to evaluate against usage policy. The authorization identity is similar to identification information in an identity certificate. The policy enforcement identity is used to ensure the confidentiality of granted permissions and content key. The policy enforcement identity enforces a usage license on an authorization principal's (e.g., recipient's) machine. The policy enforcement identity's enforcement of a usage license is similar use of a cryptographic key in an identity certificate. | 03-29-2012 |
20120079557 | DERIVING EXPRESS RIGHTS IN PROTECTED CONTENT - The present invention extends to methods, systems, and computer program products for deriving express rights in protected content. Embodiments of the invention provide mechanisms to convert implicit rights to express rights for entities, including applications, inside and outside of an organizational (e.g., enterprise) boundary. The conversion can occur dynamically, based on the information protection policies defined by a policy administrator, granting entities express access to perform tasks on protected content. | 03-29-2012 |