Popular terms

Third Party topics
Third Party
Cloud Computing
Data Storage
Search Engine
Internet Of Things
Database Server
Data Processing
Documentation
Information Technology
Digital Content
Social Media
Content Provider
User Interface
User Input

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Third Party patents



      

This page is updated frequently with new Third Party-related patent applications.




Date/App# patent app List of recent Third Party-related patents
07/21/16
20160212830 
 External control lighting systems based on third party content patent thumbnailExternal control lighting systems based on third party content
A computing system (200) and a method of generating data for enabling external control of a lighting system (100) comprising a plurality of light sources (101, 102) based on third party content are provided. The computing system is configured to receive a plurality of registrations of lighting systems and, for each of the registered lighting systems, information including indications of positions of at least some of the light sources of the lighting system, and to map the information onto a coordinate system.
Philips Lighting Holding B.v.


07/21/16
20160212614 
 Provision of additional network addressable numbers on single mobile device patent thumbnailProvision of additional network addressable numbers on single mobile device
A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


07/21/16
20160212600 
 Provision of additional network addressable numbers on single mobile device with no calling number identifier patent thumbnailProvision of additional network addressable numbers on single mobile device with no calling number identifier
A method and system are described for servicing a second line service (“sls”) based communication request originating from a subscriber's telecommunications device (“td”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the sls phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number..
Movius Interactive Corporation


07/21/16
20160212381 
 Participating in a peer-to-peer communication session patent thumbnailParticipating in a peer-to-peer communication session
A third party automatically participates in a peer-to-peer communication session established between a first endpoint and a second endpoint. Once the peer-to-peer communication session is established, a third party receives a first user data provided by the first endpoint, and verifies the first user data.
International Business Machines Corporation


07/21/16
20160212269 
 Telecommunications device enabled with multiple network recognizable numbers patent thumbnailTelecommunications device enabled with multiple network recognizable numbers
A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


07/21/16
20160210618 
 System and  utilizing random and non-random based occurences for payouts on financial instruments patent thumbnailSystem and utilizing random and non-random based occurences for payouts on financial instruments
Disclosed is a debt repayment lottery/game system and method that allows a pool of players with existing loan debt such as student loans, mortgages, personal loans, credit card debt, automobile loans, boat loans, plane loans, investment loans, and other such debt. The winning payout is made to a third party versus the actual winner.
Sldr, Inc.


07/21/16
20160210464 
 Performing an operation on a data storage patent thumbnailPerforming an operation on a data storage
A method of performing an operation on a data storage for storing data being encrypted with a key kd associated with an owner of the data is provided. The method includes deriving, for each authorized client cj, a first key kcj and a second key ktj, providing the client cj with the first key kcj, and providing a trusted third party (ttp) with the second key ktj.
Telefonaktiebolaget Lm Ericsson (publ)


07/21/16
20160210363 
 Contextual search using natural language patent thumbnailContextual search using natural language
A context aware digital assistant supported on devices such as smartphones, tablet computers, wearable computing devices, personal computers (pcs), game consoles, and the like is configured with a natural language interface that enables a user to launch searches for content using contextual references such as time, date, event, location, schedule, activity, contacts, or device. The user can thus use natural language to express the context that is applicable to the sought-after content rather than having to formulate a query that uses a specific syntax.
Microsoft Technology Licensing, Llc


07/14/16
20160205502 
 Method and system for locating an electronic device patent thumbnailMethod and system for locating an electronic device
A method and system for locating a target electronic device utilizes the wireless capabilities of multiple third party devices thereby allowing these devices to search for the target electronic device on a large scale. The third party devices electronically sense other electronic devices and report the location of the third part device when the target device is sensed..
Synchronoss Technologies, Inc.


07/14/16
20160205493 
 Method and system for remote management of access to appliances patent thumbnailMethod and system for remote management of access to appliances
Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can include any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments for the appliance, and managing access to the appliance accordingly.
Payjoy Inc.


07/14/16
20160205235 

Method and system for remote management of access to devices


Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can be any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments tier the appliance, or as content management entity (for example, helping parents to control access to digital content available to children).
Payjoy Inc.


07/14/16
20160205176 

Integrated experience for applications within a mobile application


A system and method that supports an integrated user interface experience with third party hosted applications selected and installed by a user within a user-installed native application of a user communication device.. .
Sears Brands, L.l.c.


07/14/16
20160205175 

System and an application distribution and metrics system enabling the integration of distrubuted applications into host applications and the monetizing of distributed applications


The present invention comprises an application distribution and metrics system as well as an application monetizing system (adms). The adms incorporates a cross-platform application distribution system and a usage-based and ad-based monetizing system which allows for fine-tuned usage-based pricing schemes to be created based on system-defined metrics and developer-defined metrics, seamless integration of ad-based monetizing, third party participation in monetizing efforts, and a flexible revenue allocation process..

07/14/16
20160205132 

Methods and systems for providing comprehensive cybersecurity protection using an open application programming interface based platform solution


Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface.
At&t Intellectual Property I, Lp


07/14/16
20160205126 

Information technology security assessment system


A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system.
Bitsight Technologies, Inc.


07/14/16
20160203717 

Network security system with application for driver safety system


A driver safety system includes traffic signals communicating with a municipal controller via a first network and user devices communicating with a third party controller via a second network. Communications from the first network are provided to the second network via a repeater server providing one-way communications to avoid the possibility of hacking devices on the first network..
Connected Signals, Inc.


07/14/16
20160203701 

Emergency alert bracelet and use


An emergency alert bracelet for alerting others and drawing attention to the user when the user is in an emergency situation. The bracelet comprises a strap that can be adjustably secured on the wrist of a user.

07/14/16
20160203651 

Vehicle traffic and vehicle related transaction control system


A location enabled mobile wireless device and central system cooperate to provide traffic control such as vehicle inspection site services and toll station services. Traffic control information such as vehicle inspection site information and toll station information is independently processed by a third party provider and sent to the central system.
Intelligent Imaging Systems, Inc.


07/14/16
20160203556 

Minimum outcome assurance contracts from revenue sharing of royalties


Two new forms of financial instruments that can be offered by an issuing company at an initial public offering via an exchange or investment syndicate or otherwise, and, if used, a computerized exchange for trading. The instruments include fair revenue participation contracts (frpc) which provide investors with a right to receive a fixed percentage of the issuing company's revenue for a fixed length of time, in combination with a minimum payment guarantee underwritten by a third party guarantor which guarantees some minimum amount of royalty payments to investor, at least recouping their initial investment or resulting in some higher yield to investors.

07/14/16
20160203319 

System and providing technology-driven end-to-end managed security service products through a security marketplace


A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's experience. This capability includes cloud integration to monitor the customer's cloud workload which is then used to identify risks and make recommendations on how to mitigate those risks through the management of the customer's security infrastructure.
Leidos, Inc.


07/14/16
20160203314 

Searching data using pre-prepared search data


Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a third party application, the search data file being prepared according to predetermined format rules by the third party application, and stored, prior to receiving the search query; searching, at least a portion of the search data file using the search query to identify information that matches the search query; using the predetermined format rules to identify associated information in the search data file, the associated information being related to the information that matches the search query; obtaining search results from at least one other source; and generating a display of search results based on both the information matching the search query and the associated information, the display including the search results from the at least one other source..
Qnx Software Systems Limited


07/14/16
20160203312 

Methods, systems, and computer program products for recovering a password using user-selected third party authorization


A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.. .
At&t Intellectual Property I, Lp


07/14/16
20160203271 

System and collaborative programming of data entry workflows between system developers, end users, and third party developers


The present invention is a system for collaborative programming of data entry workflows between end users, electronic health record (ehr) system developers, and third party developers. The system comprises application servers, database servers, an ehr, and peripheral devices, all stored in a distributed computing environment.
Nuesoft Technologies, Inc.


07/14/16
20160202832 

Method for controlling multiple touchscreens and electronic device


Embodiments of the present invention disclose a method for controlling multiple touch panels and an electronic device. The method includes: acquiring a first touch event by using a first touch panel, where the first touch event is input information that is triggered by a touch gesture on the first touch panel and is incompatible with an interface of third-party application software; when the electronic device detects that currently displayed application software is third-party application software, acquiring a first instruction corresponding to the first touch event, where the third-party application software is application software that is installed in the electronic device and is developed by a third party and not by a manufacturer of the electronic device; and running the third-party application software according to the first instruction.
Huawei Device Co., Ltd.


07/14/16
20160202073 

Confidential route monitoring with traveler-configured traveler safety alerts


A user's travel is securely monitored using user-configured secure travel monitoring constraints within a secure travel profile. The user-configured secure travel monitoring constraints granularly specify controls related to user travel privacy and authorized release of travel information to a user-specified trusted third party in association with the user's travel, in addition to specifying a planned travel route and a planned travel time frame.
International Business Machines Corporation


07/14/16
20160200291 

Method for preventing relay attack on vehicle smart key system


A method for preventing a relay attack of a smart key system for a vehicle according to the present invention accurately calculates a current spaced distance between an smk unit and a fob key by using an rssi included in a response signal and a current voltage level in a process of decoding the response signal when the fob key carried by a user receives a signal applied from the smk unit installed in a vehicle and then transmits the response signal having at least two kinds of information to the smk unit, and detects a challenge signal applied from the smk unit installed in the vehicle and a noise signal included in the response signal, thereby enabling an operation of the vehicle only in a state where the carrier of the fob key secures a predetermined visual distance from the vehicle, and more definitely preventing a third party from breaking into the vehicle through rf bi-directional authentication.. .
Dae Dong Co., Ltd.


07/07/16
20160196624 

A method, process and system for facilitation and management of real estate transactions


A process to facilitate the reservation of a right to sell a piece of real estate, wherein said process includes the following steps: a first party publishing a listing of a piece of real estate; wherein the listing at least includes information selected from the following group of data relevant to the piece of real estate: address; lot number; current status reservation fee; and price data; and wherein the first party approves at least one second party; the second party who interacts with said listing by indicating their intention to reserve the said right; the second party pays a reservation fee to the first party; and a second party arranges for the sale of the piece of real estate from the first party to a third party.. .
Realestate.com.au Pty Ltd


07/07/16
20160196591 

System and making and tracking charitable contributions


A method and system of instructing an annex operation linked to the execution of a main transaction in a bank payment system comprising, for example, at least two distinct client devices and a third party device connected to an annex operation managing system, that is configured to carry out a main transaction between the two client devices. After having received from the third party device, in the annex operation managing system, information relative to the execution of the main transaction between the two client devices, at least one rule for executing the annex operation is identified according to at least one first information item of the received information.
Heoh


07/07/16
20160196569 

Message control system


Embodiments are presented for controlling usage of a communications device, whereby for a given number of messages generated from the device the operator (e.g., a child, person, etc.) has to successfully answer a question before a further batch of messages can be sent. The number of messages that can be sent before a question is to be answered can be configured by a parent.

07/07/16
20160196448 

Comment plug-in for third party system


In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured to cause a client device to send a request to a web site of a social-networking system to access a user comment, wherein the user comment is associated with content on a third-party web site hosted by the third-party system. The request comprises a first url that references the web site of the social-networking system, and the first url comprises a second url that references the third-party web site and comprises a content identifier for the content, and the request is to cause the web site of the social-networking system to access the user comment in a data store of the social-networking system.
Facebook, Inc.


07/07/16
20160196392 

System and providing medical information


A computer system and method for providing medical information to medical professionals. The system includes a wearable information storage system having a unique serial number that is securable around a user's wrist.

07/07/16
20160196276 

Source-to-processing file conversion in an electronic discovery enterprise system


Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. Embodiments herein disclosed provide for an enterprise-wide e-discovery system that provides for source-to-processing file conversion of electronic communications and, in some embodiments, decryption of encrypted electronic communication entries for the purpose of efficiently processing data and supplying the electronic data to third party data analysis providers..
Bank Of America Corporation


06/30/16
20160192192 

Method and system for assessing a message in a decentralized communication network


A method for assessing a message transmitted between at least: two parties via a previously unknown third party in a decentralized communication network, wherein all parties share a common trust architecture, includes publishing, on-behalf-of indication and public, security information of the third party; publishing, the message of the first party; evaluating the published information to extract published content of the first party by the second party as intended receiver of the message; verifying a real-world-identity of the third party and/or the signature of the third party based on the previously received trust information and/or based on the self-certifying name and the public security information of the third party; checking a trust information chain according to the common trust architecture from the second party to the third party; and assessing the content of the first party based on the checked trust chain.. .

06/30/16
20160192133 

Method, system and device for enabling an object to access a third party asset


Provided is a computer implemented method for a vehicle used in a car share journey to access priority parking spaces in a carpark. The method includes the step of obtaining location and time data for a mobile electronic device of a user/driver of the vehicle and for a mobile electronic device of at least one other user.

06/30/16
20160191717 

Hybrid network based metering server for a shared service and tracking client for wireless services


A process of modifying a usage allotment of a shared subscription in a third party wireless network includes implementing a metering system in a network separate from the third party wireless network and activating a plurality of wireless devices associated with the shared subscription in response to identification of each of the plurality of wireless devices and confirmation of use of a respective tracking system that tracks a respective usage allotment for each of the plurality of wireless devices on the metering system. In addition, the process includes receiving a change request to reallocate the respective usage allotment for at least two of the plurality of wireless devices and forwarding modification instructions to the at least two wireless devices.

06/30/16
20160191637 

Executing requests for services using shared location data


Exemplary methods, apparatuses, and systems receive, from a first user device associated with a first user, location data representing a current physical location of the first user. A request for the current physical location of the first user is received from a second user device associated with the second user.

06/30/16
20160191543 

Secure neighbor discovery (send) using pre-shared key


An extension is provided to the send protocol without requiring a cga or third party trust anchor. A shared key is provided to both a sender and receiver of a neighbor discovery (nd) message.

06/30/16
20160191470 

Method and securely transmitting communication between multiple users


A computer driven apparatus comprising at least one client device, where this client device is capable of managing and storing data. The apparatus further comprises a central location for managing subscriptions, addresses and public encryption keys.

06/30/16
20160191438 

Filtering notifications from a third party application to a user of a social networking system based on an action of the user


A method for filtering a notification being provided from an application to a user of a social networking system based on an action of the user is described. The method starts by receiving the notification from the application to the user.

06/30/16
20160189484 

Progressive jackpot alerts in a gaming system


Various embodiments are directed to a gaming system capable of providing periodic progressive level alerts or promotions. In one embodiment, the user is able to register for a progressive level alert.

06/30/16
20160189127 

Systems and methods for creating dynamic programmable credential and security cards


A dynamic credential card system for interoperating with multiple different point-of-sale systems is disclosed. The system comprises three computer systems: a dynamic digital value transfer system operating on a server, a dynamic digital value transfer application operating on a mobile digital device, and a small programmable dynamic credential card system.

06/30/16
20160188892 

Authentication system of synchronizing instant timestamp and a method thereof


The present invention is related to an authentication system of synchronizing instant timestamp issued by a digital timestamp device and a method thereof. The digital timestamp device provides an instant machine time, and the provider end uses the digital timestamp device to stamp an instant digital timestamp on a digital content.

06/30/16
20160188742 

Bookmarking search results


Methods and systems are directed to receiving a user instruction to display a set of bookmarked search results. One or more bookmark result objects can be obtained in response to the user instruction, each bookmark result object respectively corresponding to a previously received search result that a user selected for bookmarking and including one or more parameter values previously entered by a user and reference data to obtain content from a third party resource.

06/23/16
20160182312 

Location-based, server assisted peer to peer service with extensible service categories


Peer-to-peer service agreements can be facilitated by a third party without the terms of the service agreement being brokered by the third-party. In one example, a user sends a service request to a network node maintained by the third-party.

06/23/16
20160182289 

System and device pairing transaction


A provisioning mechanism that may be used when a device is distributed to a third party over an untrusted distribution channel. The provisioning mechanism allows a server to recognize and trust the remote device.

06/23/16
20160182237 

Method and system for providing a way to verify the integrity of a document


Method for providing a way to verify the integrity of a document. The invention is characterised in that the method comprises the following steps: a) publishing the document with a visibly embedded piece of information; b) providing a communication channel over which a third party can send a depiction of the published document to the central server; c) accepting said depiction of the published document in the central server, and finding, in the central server and based upon the piece of information, the document; and d) if the document was found in the central server, communicating to the third party that document itself and/or information pertinent to that document.

06/23/16
20160182170 

System architectures and methods for radiobeacon data sharing


Remote actuation of machines or machine systems is realized by a system for coupling a radiobeacon to a smart device and in turn to a broader network. The smart device is configured as a proximity-actuated “community nodal device” by an application that operates as part of the system.

06/23/16
20160180455 

Generating device, generating method, and non-transitory computer readable storage medium


A generating device according to the present application includes an acquisition unit, and a generation unit. The acquisition unit acquires information concerning a company from information transmitted on a communication network.

06/23/16
20160180398 

Prompting a user to purchase items for use in an application in a feed of content provided by an online system


An online system receives an advertisement (“ad”) request identifying an application, one or more items for use within the application, ad content, and a prompt for purchasing one or more of the items. The prompt for purchasing an item comprises text or image data describing the purchasing and instructions that, when executed by a client device, request payment information from a user accessing the prompt.

06/23/16
20160180340 

Secure payment service and system for interactive voice response (ivr) systems


A secure payment method includes receiving, by a payment recipient, a transaction request from a party in a transaction. The payment recipient requests a payment that is in a specified form and that is uniquely identified by a unique identification.

06/23/16
20160180284 

Estimation of third party inventory


Exemplary methods, apparatuses, and systems receive a browsing request to view an item offered by a first third party retailer. An estimated inventory value for the item at the first third-party retailer is retrieved.

06/23/16
20160179566 

Independent access to virtual machine desktop content


Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an enhanced virtual desktop management server/system with a content abstraction layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic api.

06/23/16
20160174614 

Golf jersey


A golf jersey comprises a shirt having a collar with at least one digit on the back of the jersey. Such a jersey can expand into a matched set that provides recognition of a golfer and provides advertisements and financial benefits to the golfer, other individuals, or an organization, without necessarily requiring third party endorsements.

06/16/16
20160174032 

Automated onsite information search and multimedia method and system


The invented method and system consists of a software application installed on a mobile device with internet connection and a geographical positioning device; a remote server and or an onsite wireless communication apparatus. The software application communicates and transfers data with the remote server or the onsite wireless communication apparatus.

06/16/16
20160173950 

Third witness video participation system and method


A video recording and law enforcement corroboration process. A video feed is established between a law enforcement officer and a perpetrator, initiated by either party.
Virtual Health Systems Corporation


06/16/16
20160173621 

Method and procedure for dynamic services orchestration that runs within an on-device software container


A system for providing network services is provided. The system includes a device configured to interface with the network to receive a container, where the container is configured to interface with an operating system of the device and a plurality of applications operating on the device.
Reliance Jio Infocomm Usa, Inc.


06/16/16
20160173491 

Method and system for sharing two-factor authenticators to access electronic systems


A storage server is provided and configured to: receive a time-based access code from a computing device of a customer having an account with a resource provider, the time-based access code to be valid during a future time window and including a secret value provided by the resource provider; store the time-based access code; generate a url linked to the stored time-based access code; send the url to the customer to send to the third party to send to the storage server; receive the url from the third party; and send the time-based access code to the third party only if the url is received during the time window, whereupon the third party attempts to log into the resource provider and gains access to the account of the customer if the resource provider verifies the secret value and the time at which the login by the third party is attempted.. .

06/16/16
20160171980 

Digital assistant voice input integration


A digital assistant supported on devices such as smartphones, tablets, personal computers, game consoles, etc. Includes an extensibility client that exposes an interface and service that enables third party applications to be integrated with the digital assistant so the application user experiences are rendered using the native voice of the digital assistant.
Microsoft Technology Licensing, Llc


06/16/16
20160171488 

Authentication and verification services for third party vendors using mobile devices


A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (aaa) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud..
Alcatel Lucent


06/16/16
20160171447 

Methods and systems for providing promotional video


A computer system and implemented method for distributing job application video includes: receiving an applicant's identifying information and creating an applicant account; receiving a video of an applicant and associating the video with the applicant account; indexing the video of the applicant and adding the applicant's identifying information to a searchable database for third party viewers, wherein the third party viewers are registered; providing the third party viewers access to the video of the applicant upon request by the applicant and/or the third party viewer; and tracking third party views of the video and updating a status of the applicant account with each third party view.. .

06/16/16
20160171001 

Source-to-processing file conversion in an electronic discovery enterprise system


Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. Embodiments herein disclosed provide for an enterprise-wide e-discovery system that provides for source-to-processing file conversion of electronic communications and, in some embodiments, decryption of encrypted electronic communication entries for the purpose of efficiently processing data and supplying the electronic data to third party data analysis providers..
Bank Of America Corporation


06/16/16
20160167479 

Vehicle monitoring system


A vehicle monitoring system configured to cause a vehicle to perform a corrective action if a dangerous vehicle interior condition is detected and an occupant is present. The vehicle monitoring system monitors the temperature and gas, such as co2, and compares the levels of each to a threshold value.

06/09/16
20160165268 

Apparatus and methods for providing content to an ip-enabled device in a content distribution network


Apparatus and methods for providing content to ip-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed which enables delivery of content to such ip-enabled devices without the use of a high-speed data connection this capability allow the managed network operator to provide content services to an ip-enabled device associated with a non-data subscriber.
Time Warner Cable Enterprises Llc


06/09/16
20160165073 

Image coordination in a fleet of disparate imaging devices


Apparatus and methods coordinate imaging in a fleet of disparate imaging devices. Each imaging device is associated to a unique identifier.
Lexmark International, Inc.


06/09/16
20160165044 

System and call authentication


A system and method of authenticating voice calls by recording the call and generating a transcript of the recorded call. The invention includes a recording unit configured to record audio communications taking place on a communications device, and storing the recorded call as an audio file.

06/09/16
20160164890 

Techniques for sharing network security event information


This disclosure provides an architecture for sharing information between network security administrators. Events converted to a normalized data format (ccf) are stored in a manner that can be queried by a third party (e.g., an administrator of another, trusted network).
Brightpoint Security, Inc.


06/09/16
20160164885 

Identity and trustworthiness verification using online and offline components


Methods and systems for verifying the identity and trustworthiness of a user of an online system are disclosed. In one embodiment, the method comprises receiving online and offline identity information for a user and comparing them to a user profile information provided by the user.
Airbnb, Inc.


06/09/16
20160164874 

Management of drone operations and security in a pervasive computing environment


A method to provide negotiation control to data such that a person or entity can negotiate the use of data gathered beyond what is needed for a particular use by a third party transaction. The method also provides negotiation for the control and operation of autonomous vehicles such as drones operating in non-public space..
Lens Ventures, Llc


06/09/16
20160162961 

System and ownership and transfer of digital art


A method of verifying, controlling and limiting distribution of digital artwork files, comprises designating a trusted third party registration server; receiving a digital artwork; registering the received artwork at the registration server; defining an allowed number of copies of the registered artwork, the allowed number being at least one; creating individual copies of the artwork up to the allowed number; at the registration server assigning an individual copy to a user; supplying the user with a file comprising an electronically watermarked version of the individual copy; allowing the user to relinquish the individual copy; upon relinquishing, making the individual copy available to a second user by repeating the supplying stage.. .
Claydo Lab Ltd.


06/09/16
20160162848 

System and enabling third party entitlements for enterprise partners based on customer printing behaviors


A customer workstation with a device discovery tool is connected to a network. The device discovery tool obtains identifying information about document-processing devices connected to the network.
Xerox Corporation


06/09/16
20160159632 

System and optimizing hydration and for the contextual dispensing of additives


Provided are systems, methods, and apparatuses for a portable hydration system including a mechanical or electromechanical mechanism for dispensing additives into a liquid or other solute in a portable container. Such additives include solids, liquid, powders, and gases, and include vitamins, minerals, nutritional supplements, pharmaceuticals, and other consumables.
Lifefuels, Inc.


06/09/16
20160157780 

Sleep measurement computer system


A system and method that will serve for measuring the sleep of at least one user. The system will provide the measurement by communicating sleep parameters of at least one user to a mobile third party client application 170 from a sensor device 120.
Beddit Oy


06/02/16
20160157203 

Cell-id translation in a location based system (lbs)


A cell-id translation module accesses a cell-id translation database to associate original cell-id information with new or changed (i.e., translated) cell-id information received by a handset. A cell-id database is effectively regularly changed rendering useless any third party databases previously collected without authorization by the relevant mobile operators.
Telecommunication Systems, Inc


06/02/16
20160156725 

Managing interaction with hosted services


Systems and methods are disclosed which facilitate managing interaction with instances corresponding to hosted services. Customers may implement services on a hosted computing environment.
Amazon Technologies, Inc.


06/02/16
20160155293 

Secure remote gaming player registration


An electronic wager based gaming system includes primary communication devices, a game administration server component, and a player account server component, all adapted to communicate with separate third party computing (i.e., player) devices, such as smart phones. The game administration component administers wager based game play on player devices and communicates game inputs and results therewith via primary communication devices.
Mobile Gaming Technologies, Inc.


06/02/16
20160155119 

Systems and methods for conducting transactions and communications using a trusted third party


Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it.
Intertrust Technologies Corporation


05/26/16
20160150416 

Coexistence management service for spectrum sharing


Systems and methods are provided for coexistence management service for licensed and unlicensed spectrum sharing. A coexistence system may include a coexistence manager (cm) that may provide resource allocation services for a coexistence enabler (ce).
Interdigital Patent Holdings, Inc.


05/26/16
20160149931 

Methods and systems for providing comprehensive cyber-security protection using an open application programming interface based platform solution


Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface.
At&t Intellectual Property I, L.p.


05/26/16
20160148287 

Lunch order communication


Systems and related methods for providing ordering and delivery of goods and services from a merchant are discussed herein. A determination that a user is no longer eligible for an offer of an item may be performed in response to receiving input from the user about the offer.
Peach Labs, Inc.


05/26/16
20160148232 

Using hashed media identifiers to determine audience measurement data including demographic data from third party providers


Example methods to perform audience measurement disclosed herein include performing a hashing operation on a first media identifier and a plurality of data values to determine a plurality of hashed media identifiers to identify first media, a first one of the hashed media identifiers being different from a second one of the hashed media identifiers. Disclosed example methods also include sending the first one of the hashed media identifiers to a media provider to identify the first media during a first monitoring interval.
The Nielsen Company (us), Llc


05/26/16
20160148006 

Privacy user interface for websites


A privacy user interface for websites is described. In one or more implementations, website information associated with a website is detected responsive to navigating to the website using a web platform.
Microsoft Technology Licensing Llc


05/26/16
20160147970 

Mobile self-management compliance and notification method, system and computer program product


A computerized interactive method, system and computer program product is provided for managing a person's health and lifestyle through self-managing controlled notifications, feedback, and alerts are disclosed. Embodiments provide computerized self-management and compliance scheme that does not require third party intervention or treatment options typical with immediate-response or alert-based systems.
Lifewire Corporation


05/26/16
20160147817 

Data credibility vouching system


A system, method and program product are provided for implementing a credibility vouching system (cvs). A cvs is disclosed that includes: credibility vouching system (cvs), comprising: a data aggregation system interface that provides a communication pathway for receiving event metadata (em) records from a data aggregation system; a service provider interface and inquiry system that provides a communication pathway with a plurality of third party service providers to facilitate identification of a set of candidate nodes potentially responsible for a submitted em record in the data aggregation system; a vouching request routing system for generating a vouching request and tasking at least one third party service provider to forward the vouching request to the set of candidate nodes; and a credibility scoring system that generates a credibility score for the submitted em record based on a set of vouching responses received from the set of candidate nodes..
International Business Machines Corporation


05/19/16
20160142904 

Method and data management of third party services


Aspects of the subject disclosure may include, for example, a method comprising caching, by a server comprising a processor, a subscriber profile in a network repository to create a cached subscriber profile. The cached subscriber profile comprises a replica of stored subscriber data.
At&t Intellectual Property I, Lp


05/19/16
20160142537 

Voice message exchange


Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time.
Value-added Communications, Inc.


05/19/16
20160140838 

Systems, devices, and methods for remotely interrogated chemosensor electronics


Systems, devices and methods for remotely interrogating sensor electronics are described. In one embodiment, a system for detecting and localizing chemical analytes is described.
Raytheon Bbn Technologies Corp.


05/19/16
20160140776 

Communications based on vehicle diagnostics and indications


Methods and systems for communicating vehicle conditions based on vehicle component diagnostics and indications are provided. Specifically, various components of a vehicle may provide diagnostic information that can be collected and interpreted by a diagnostics module.
Autoconnect Holdings Llc


05/19/16
20160140612 

Method and transmitting frequency division multiplexed targeted in-store advertisements


A method, computer-readable storage device and apparatus for transmitting frequency division multiplexed targeted in-store advertisements are disclosed. For example, the method receives a plurality of advertisements from a third party entity, wherein each one of the plurality of advertisements targets one of a plurality of different demographics of customers for a retailer, frequency division multiplexes the plurality of advertisements into the electronic media package, identifies each one of the plurality of different demographics of customers is at the retailer for each one of a plurality of different time periods, and transmits the electronic media package and an instruction regarding which frequency to tune to for each one of the plurality of different time periods based on one of the plurality of different demographics of customers who is at the retailer during the each one of the plurality of different time periods..
At&t Intellectual Property I, L.p.


05/19/16
20160140547 

System and providing transaction verification


A transaction verification process performed by a transaction network operator in communication with a client computing device and a third party provider. A computing device may be equipped with an integrity verification module for verifying the system integrity of the computing device, and a cryptographic module for digitally signing transaction requests.
Google Inc.


05/19/16
20160140544 

Systems and methods for effectively anonymizing consumer transaction data


Systems and methods are described that anonymized consumer transaction data in such manner to prevent de-anonymization to reveal personally identifiable information (pii) of the consumers. The process includes selecting particular consumer transaction data, generating a dictionary of items, generating consumer groups, matching consumer transaction data for each consumer to a group, forming modifiable consumer transaction histories, and quantifying a similarity between consumer groups.
Mastercard International Incorporated


05/19/16
20160140458 

Kiosk for energy sector logistics


An automated kiosk and related apparatus provide check-in and boarding services to energy sector passengers, such as helicopter passengers. Preferably, the kiosk and related apparatus can take and store a picture of the passenger, calculate and/or measure the weight of the passenger and the passenger's luggage, print luggage tags and boarding printouts, check third parties' databases (such as a no-fly list (nfl)) for approval for the passenger's flight and can transmit data to another location (server, third party employer, pilot)..
Phi, Inc.


05/19/16
20160140348 

System and matching data sets while maintaining privacy of each data set


A system and method that allows two parties to find common records in their data sets without having to actually share the data sets with each other or a third party. Two primitives, perfect hash functions and public key cryptography, are combined in a unique way to obtain a secure and efficient private matching solution.
Pitney Bowes Inc.


05/19/16
20160140101 

Method for associating third party content with online document signing


Techniques for electronic signature process management are described. Some embodiments provide an electronic signature service (“ess”) configured to associate third-party content with electronic signature documents by way of dynamic form fields.

05/19/16
20160139911 

External platform extensions in a multi-tenant environment


Methods and systems are described for allowing third party developers to add extensions to a cloud service provider's software as a service (saas) services by editing an ‘empty’ config file according to a schema provided by the cloud service provider to form a delta file and then merging the delta file with an internal, full version of the config file. The full config file is then used to initialize and instantiate objects upon a restart of the cloud provider's services..
Oracle International Corporation


05/12/16
20160134712 

Method, system, and graphical user interface for sharing media items from third party media sources


A method for sharing media items from third party media sources and a graphical user interface for sharing media items. Media items such as images, videos, etc., may be available from various third party media sources at events such as sports games and concerts.
Crt & Associates, Inc.


05/12/16
20160134654 

Third party centralized data hub system providing shared access to third party questionnaires, third party responses, and other third party data


A system for providing a third party centralized data hub. The system includes a server storing a database of sets of third party data, and the system includes a third party risk management module on the server maintaining the third party data.
Markit North America, Inc.


05/12/16
20160134556 

Implementation of third party services in a digital service platform


Systems and method for implementing third party services in digital service platform are provided. More specifically, an application program interface can be provided by a first service provider to a second service provider.
Google Inc.


05/12/16
20160132884 

Real-time payments through financial institution


A payment provider uses bank rails to enable a bank customer to send real-time payments through the bank site by simply entering a recipient identifier, such as an email address or mobile number. The bank has an account with the payment provider.
Paypal, Inc.


05/12/16
20160132858 

System and default payment setting


A consumer accesses a secure area of a transaction account website and provides their login information for retail websites. The transaction account issuer or a third party creates a script that logs in to the retail websites on behalf of the consumer and transmits transaction account information associated with the transaction account.
American Express Travel Related Services Company, Inc.


05/12/16
20160132818 

Signing agent management software


The embodied invention is a software system in a central computer that facilitates scheduling of a high volume of meetings among a wide array of individuals and companies with important secure methods for managing documents requiring a notarized signature or third party document exchange. The schedule is run from a central location where individual notaries attend signing appointments and closings.

05/12/16
20160132807 

Method for managing signing agents


The embodied invention is a software system in a central computer that facilitates scheduling of a high volume of meetings among a wide array of individuals and companies with important secure methods for managing documents requiring a notarized signature or third party document exchange. The schedule is run from a central location where individual notaries attend signing appointments.

05/12/16
20160132806 

Catalog service platform for deploying applications and services


A service provider system may implement an enterprise catalog service that manages catalogs or portfolios of software products (e.g., desktop applications and server products) on behalf of service provider customer organizations. Through the enterprise catalog service, an administrator in a customer organization may discover, select, and ingest products (e.g., based on their features, pricing, and terms), and may add them to catalogs or portfolios for subsequent use by end users in the organization.
Amazon Technologies, Inc.




Third Party topics: Third Party, Cloud Computing, Data Storage, Search Engine, Internet Of Things, Database Server, Data Processing, Documentation, Information Technology, Digital Content, Social Media, Content Provider, User Interface, User Input

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Third Party for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Third Party with additional patents listed. Browse our RSS directory or Search for other possible listings.


0.8567

5178

1 - 1 - 110