Follow us on Twitter
twitter icon@FreshPatents

Third Party patents

      

This page is updated frequently with new Third Party-related patent applications.




 Method and system for family plan sharing of wireless services patent thumbnailnew patent Method and system for family plan sharing of wireless services
A system and process of sharing a wireless surface allotment in a third party wireless network includes implementing a metering system to meter wireless service usage by users of the third party wireless network and tracking wireless usage by a plurality of wireless devices associated with the metering system. The system and process further includes receiving a share request to reallocate the respective wireless service allotment for at least two of the plurality of wireless devices, forwarding modification instructions to the metering system, requesting confirmation from the metering system that the modification instructions have been received, and modifying the respective wireless service allotments for the at least two wireless devices in response to receiving confirmation from the metering system..
Tracfone Wireless, Inc.


 System and method to enable pki- and pmi- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means - added patent thumbnailnew patent System and method to enable pki- and pmi- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means - added
A central server configured with an attribute authority (“aa”) acting as a trusted third party mediating service provider and using x.509-compatible pki and pmi, vpn technology, device-side thin client applications, security hardware (hsm, network), cloud hosting, authentication, active directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys.
T-central, Inc.


 Distracting module system patent thumbnailnew patent Distracting module system
A distracting module system includes a hydro pneumatic solution tank, a valve, a nozzle, a controller and a detecting system. The controller is programmed to receive a sensor alert signal from the detecting system and send an activation signal to the valve to regulate and control fluid movement from the hydro pneumatic solution tank through the valve and to the nozzle, and to deliver information related to the sensor alert signal and the activation signal to third party devices..
Crotega, Llc


 Method and  conducting focus groups using networked gaming devices patent thumbnailnew patent Method and conducting focus groups using networked gaming devices
The invention includes a system and method for conducting a focus group via networked gaming devices. A slot server or a third party server in communication with gaming devices provides access to players operating the gaming devices.
Igt


 Method for optimizing automated management of third party insurance claim processing and devices thereof patent thumbnailnew patent Method for optimizing automated management of third party insurance claim processing and devices thereof
This technology optimizes management of third party insurance claim processing includes retrieving third party claim data associated with a selected third party claim and from an automatic integration with at least one additional insurance claim application initiated based on the selection of the third party claim. One or more customized claim management operations are executed based on the selected third party claim and at least a portion of the retrieved third party claim data.
Mitchell International, Inc.


 Vehicle performance based on analysis of drive data patent thumbnailnew patent Vehicle performance based on analysis of drive data
Data is collected during the operation of a vehicle and used to produce a ranking of a driver's performance, and that ranking is shared on a hosted website, such that the drivers can compare their performance metrics to their peers. Fleet operators can use these performance metrics as incentives, by linking driver pay with performance.
Zonar Systems, Inc.


 Mobile communication device monitoring systems and methods patent thumbnailMobile communication device monitoring systems and methods
Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services on a mobile communication device, such as communications, application use, functionality, operability, and/or presence, may be monitored against rules available from a central data center repository.
Eagency, Inc.


 Distribution of digital media files patent thumbnailDistribution of digital media files
Methods and systems are described for preparing digital media files containing visual and/or audio information for distribution, and for sharing the files so as to prevent unauthorised use and/or distribution. The method comprises: copying the digital media file to create a second media file; selecting at least one part of the second digital media file; removing the at least one part from the remainder of the second digital media file; processing the at least one part so as to obfuscate or camouflage the information therein, and inserting the at least one processed part into the remainder of the second digital media file to create a camouflaged digital media file.
The Panama Bureau Limited


 Integration of intentional noise into a communication channel to simulate activity patent thumbnailIntegration of intentional noise into a communication channel to simulate activity
An example method of simulating activity to conceal actual activity associated with a wireless network includes generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device. The sham push message includes an indication that the sham push message is not an actual push message from a third party associated with the mobile application.
Red Hat, Inc.


 Information sharing for third party applications in cellular telecommunication infrastructures patent thumbnailInformation sharing for third party applications in cellular telecommunication infrastructures
A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device.
International Business Machines Corporation


System of third party control of network connected devices


A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer.
Honeywell International Inc.


System of demand response provider control of network connected devices


A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer.
Honeywell International Inc.


Extension of third party application functionality for intent determination


Intent determination as a service (iaas) is disclosed. A third party application may be provided access to an iaas service.
Microsoft Technology Licensing, Llc


Universal call management platform


Systems, methods and computer program products for enabling integration between various internet- or non-internet based communication services (e.g., as provided by different communications platforms and service providers) using a universal platform are described. In some implementations, a service manager is provided that can integrate call management capabilities with multiple communications platforms using the universal platform to enable seamless communication between the various platforms.
Ringcentral, Inc.


System and a third party web-based application to build and automatically generate project web pages offering crowdfunding opportunities for artists


A system including one or more servers, each server communicably coupled to a first user device and a second user device, the one or more servers being configured to receive, from the first user device, information regarding a project of an artist, create project data based on the received information regarding the project, the project data comprising a name and at least one of a type, a language, a description, a start date, an estimated completion date, a prospective release date and/or a revenue goal, store the project data in a database of the one or more servers, and transmitting or providing, via a network or website, information associated with the stored project data to the second user device.. .
Artistshare, Inc.


System and direct response advertising


Systems and methods to gather information regarding user responses to advertising. The system determines and/or obtains information identifying a commercial good that is related to an advertisement presented to a user.
Direct Path, Llc


Authorizing access by a third party to a service from a service provider


Systems and methods are provided for authorizing third-party access to a specific service from a service provider. In an example embodiment, a server system identifies a shared service from multiple services provided by the server system.
Adobe Systems Incorporated


Systems and methods for facilitating mobile commerce interactions between customers and merchants


Systems and methods are provided for facilitating mobile commerce interactions between a customer and a merchant, whereby a customer, having initiated a mobile commerce transaction via a mobile device, arrives at a merchant location to complete the transaction. In some embodiments, an intermediate remote server is employed to facilitate communication between a third party app running on a customer mobile computing device, and an app-agnostic merchant computing device residing at a merchant location.
Lucova Inc.


System and methods for third-party access to a network-based system for providing location-based upcoming event information


A system and methods for third-party access to a network-based system for providing location-based upcoming event information are described. The location-based upcoming event information may be accessed from the network-based system by a server-side web application implemented by a third party.
Paypal, Inc.


Software license and installation process management within an organization


A software license and a software installation process are managed. A status of the license can be one of at least a third party reserved status, a requester reserved status, a requester allocated status, and an available status.
International Business Machines Corporation


Payment card reconciliation by authorization code


A payment processor acting on behalf of a third party administrator to make payment on an adjudicated claim makes a straight through payment to an acquirer for a health care provider's merchant account. Via the authorization process, the payment processor generates an authorization code which is returned to the health care provider on its merchant statement for the payment.
Stoneeagle Services, Inc.


Content sharing


Disclosed are embodiments of systems and methods that allow for the robust, flexible, and efficient sharing of content. In embodiments, content items may be associated with labels, tags, or other identifiers, third parties may be associated with labels, tags, or other identifiers, and sharing with the third party may be based upon comparisons of the labels, tags, or other identifiers associated with the content items and the labels, tags, or other identifiers associated with the third parties..
Start Project, Llc


External zero emissions indicator


A system for notifying a third party as to whether a vehicle is producing or generating emissions. The system includes an internal combustion engine capable of producing exhaust gases, an exhaust pipe coupled to the internal combustion engine and for allowing passage of the exhaust gases and a sensor positioned within the exhaust pipe and configured to determine a characteristic of the exhaust gases.
Toyota Motor Engineering & Manufacturing North America, Inc.


Rotary pill dispenser and use


An automated medication dispenser system is disclosed. The system includes a dispenser device comprising a medication dispensing and storage module, a dispensing drive and control mechanism, and a communications interface.
Msc Dispenser, Llc


Systems and methods for call backup and takeover using web and mobile interfaces


A telecommunications system for handling call volume, including an application with takeover ability loaded on a mobile device, updating the application when a call is being handled by a third party, and transferring the call when an option to takeover is chosen.. .
Gubagoo, Inc.


Method and system for communication devices


In one embodiment a user interface for a communication device is described, the user interface including a first icon representing a first communication event between a first party and a second party, and a second icon representing a second communication event between the first party and a third party, a processor to receive input signals from the first party, the signals input via the user interface, the processor, in response to the received input signals, performs one of a communication event transfer including transferring the first communication event from being between the first party and the second party to being between the second party and the third party, and a communication event merger including the creation of a merged communication event between the user, the second party, and the third party. Related methods, systems, and apparatuses are also described..
Cisco Technology, Inc.


Method and system for validating interfering signals


Systems, apparatus and methods for validating whether an interfering communications signal has been encountered by a node in a wireless communications network due to signals transmitted by a node operating in another wireless communications network. The wireless communications networks may operate as directional wireless communications networks.

Computer system for generating calculator interface elements for remote device display


Described are computer systems for interactions with a user device and third party computers. In an embodiment, a computer system for determining and displaying total loss calculations includes accessing third party computer systems for a plurality of data items.
Hartford Fire Insurance Company


System and process for rating crowdfunding campaigns and funding campaigns by crowdfunding websites with or without the help of user generated ratings scores


The invention is based on a business process operation for a crowdfunding portal or website creating a new funding process and an online community where a pool of funds is been created by a percentage of donation activities on its portal, is used to fund automated selected campaigns on the crowdfunding portal, based on an algorithmic calculated score generated by users activity for each campaign. This pool of funds is governed by selected members of the portal.
Funsidy Llc


Systems and methods for digital multimedia capture using haptic control, cloud voice changer, protecting digital multimedia privacy, and advertising and sell products or services via cloud gaming environments


Provided is a method for advertising and retailing products and services in cloud gaming environments. A game provider may configure its cloud gaming environment to display third party advertisement before, during, or after the game.

Method and system for embedding third party data into a saas business platform


Disclosed is an improved method, system, and program product to implement a business platform that assigns a server instance and dedicated database to each business customer. A connector is configured to retrieve data from an external data source.
Oracle International Corporation


Method and content presentation in association with a communication connection


A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party.

Switch controller for separating multiple portions of call


An example method includes providing third party access to listen to a call and the ability to inject audio into an isolated audio portion of the call by using a switch controller within a mobile virtual network operator (mvno) platform. The switch controller can to separate a call into multiple audio portions.
Tevnos Llc


Method and content presentation in association with a communication connection


A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party.

Connecting radio base stations via a third party network


There is provided a radio base station suitable for a wireless communications network. The radio base station is arranged to request a local ip address from a dhcp server the request including a local port number.
Telefonaktiebolaget Lm Ericsson (publ)


Task completion in email using third party app


Among other things, one or more techniques and/or systems for providing a third party app through an email user interface are provided. That is, an email user interface may provide access to an email comprising email content (e.g., a message regarding meeting for dinner at the emerald tavern).
Microsoft Technology Licensing, Llc


System and integrating two-factor authentication in a device


A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider.. .
Duo Security, Inc.


Method of calculating route, and method or device for obtaining route


A method of determining whether there is a need to re-calculate a trip route including a departure point and a destination by using traffic information according to an embodiment of the present invention is provided. The method is performed by a server and includes: receiving the current position from a terminal when the terminal moves a specific distance from a previously reported position; obtaining the current position of a third party when the destination is the position of the third party defined as the identifier (id) of the third party; and determining whether there is a need to re-calculate the route according to a specific condition based on the obtained current position of the third party, wherein the specific condition is (1) when the third party moves a distance equal to or greater than a predetermined value from the previously reported position or (2) when the third party moves a distance equal to or greater than a predefined value from the previously reported position and the distance between the current position of the terminal and the current position of the third party is shorter than a critical value, and if one of the specific conditions is satisfied, it may be determined that there is a need to re-calculate the route..
Lg Electronics Inc.


External control lighting systems based on third party content


A computing system (200) and a method of generating data for enabling external control of a lighting system (100) comprising a plurality of light sources (101, 102) based on third party content are provided. The computing system is configured to receive a plurality of registrations of lighting systems and, for each of the registered lighting systems, information including indications of positions of at least some of the light sources of the lighting system, and to map the information onto a coordinate system.
Philips Lighting Holding B.v.


Provision of additional network addressable numbers on single mobile device


A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


Provision of additional network addressable numbers on single mobile device with no calling number identifier


A method and system are described for servicing a second line service (“sls”) based communication request originating from a subscriber's telecommunications device (“td”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the sls phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number..
Movius Interactive Corporation


Participating in a peer-to-peer communication session


A third party automatically participates in a peer-to-peer communication session established between a first endpoint and a second endpoint. Once the peer-to-peer communication session is established, a third party receives a first user data provided by the first endpoint, and verifies the first user data.
International Business Machines Corporation


Telecommunications device enabled with multiple network recognizable numbers


A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


System and utilizing random and non-random based occurences for payouts on financial instruments


Disclosed is a debt repayment lottery/game system and method that allows a pool of players with existing loan debt such as student loans, mortgages, personal loans, credit card debt, automobile loans, boat loans, plane loans, investment loans, and other such debt. The winning payout is made to a third party versus the actual winner.
Sldr, Inc.


Performing an operation on a data storage


A method of performing an operation on a data storage for storing data being encrypted with a key kd associated with an owner of the data is provided. The method includes deriving, for each authorized client cj, a first key kcj and a second key ktj, providing the client cj with the first key kcj, and providing a trusted third party (ttp) with the second key ktj.
Telefonaktiebolaget Lm Ericsson (publ)


Contextual search using natural language


A context aware digital assistant supported on devices such as smartphones, tablet computers, wearable computing devices, personal computers (pcs), game consoles, and the like is configured with a natural language interface that enables a user to launch searches for content using contextual references such as time, date, event, location, schedule, activity, contacts, or device. The user can thus use natural language to express the context that is applicable to the sought-after content rather than having to formulate a query that uses a specific syntax.
Microsoft Technology Licensing, Llc


Method and system for locating an electronic device


A method and system for locating a target electronic device utilizes the wireless capabilities of multiple third party devices thereby allowing these devices to search for the target electronic device on a large scale. The third party devices electronically sense other electronic devices and report the location of the third part device when the target device is sensed..
Synchronoss Technologies, Inc.


Method and system for remote management of access to appliances


Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can include any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments for the appliance, and managing access to the appliance accordingly.
Payjoy Inc.


Method and system for remote management of access to devices


Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can be any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments tier the appliance, or as content management entity (for example, helping parents to control access to digital content available to children).
Payjoy Inc.


Integrated experience for applications within a mobile application


A system and method that supports an integrated user interface experience with third party hosted applications selected and installed by a user within a user-installed native application of a user communication device.. .
Sears Brands, L.l.c.


System and an application distribution and metrics system enabling the integration of distrubuted applications into host applications and the monetizing of distributed applications


The present invention comprises an application distribution and metrics system as well as an application monetizing system (adms). The adms incorporates a cross-platform application distribution system and a usage-based and ad-based monetizing system which allows for fine-tuned usage-based pricing schemes to be created based on system-defined metrics and developer-defined metrics, seamless integration of ad-based monetizing, third party participation in monetizing efforts, and a flexible revenue allocation process..

Methods and systems for providing comprehensive cybersecurity protection using an open application programming interface based platform solution


Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface.
At&t Intellectual Property I, Lp


Information technology security assessment system


A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system.
Bitsight Technologies, Inc.


Network security system with application for driver safety system


A driver safety system includes traffic signals communicating with a municipal controller via a first network and user devices communicating with a third party controller via a second network. Communications from the first network are provided to the second network via a repeater server providing one-way communications to avoid the possibility of hacking devices on the first network..
Connected Signals, Inc.


Emergency alert bracelet and use


An emergency alert bracelet for alerting others and drawing attention to the user when the user is in an emergency situation. The bracelet comprises a strap that can be adjustably secured on the wrist of a user.

Vehicle traffic and vehicle related transaction control system


A location enabled mobile wireless device and central system cooperate to provide traffic control such as vehicle inspection site services and toll station services. Traffic control information such as vehicle inspection site information and toll station information is independently processed by a third party provider and sent to the central system.
Intelligent Imaging Systems, Inc.


Minimum outcome assurance contracts from revenue sharing of royalties


Two new forms of financial instruments that can be offered by an issuing company at an initial public offering via an exchange or investment syndicate or otherwise, and, if used, a computerized exchange for trading. The instruments include fair revenue participation contracts (frpc) which provide investors with a right to receive a fixed percentage of the issuing company's revenue for a fixed length of time, in combination with a minimum payment guarantee underwritten by a third party guarantor which guarantees some minimum amount of royalty payments to investor, at least recouping their initial investment or resulting in some higher yield to investors.

System and providing technology-driven end-to-end managed security service products through a security marketplace


A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's experience. This capability includes cloud integration to monitor the customer's cloud workload which is then used to identify risks and make recommendations on how to mitigate those risks through the management of the customer's security infrastructure.
Leidos, Inc.


Searching data using pre-prepared search data


Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a third party application, the search data file being prepared according to predetermined format rules by the third party application, and stored, prior to receiving the search query; searching, at least a portion of the search data file using the search query to identify information that matches the search query; using the predetermined format rules to identify associated information in the search data file, the associated information being related to the information that matches the search query; obtaining search results from at least one other source; and generating a display of search results based on both the information matching the search query and the associated information, the display including the search results from the at least one other source..
Qnx Software Systems Limited


Methods, systems, and computer program products for recovering a password using user-selected third party authorization


A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.. .
At&t Intellectual Property I, Lp


System and collaborative programming of data entry workflows between system developers, end users, and third party developers


The present invention is a system for collaborative programming of data entry workflows between end users, electronic health record (ehr) system developers, and third party developers. The system comprises application servers, database servers, an ehr, and peripheral devices, all stored in a distributed computing environment.
Nuesoft Technologies, Inc.


Method for controlling multiple touchscreens and electronic device


Embodiments of the present invention disclose a method for controlling multiple touch panels and an electronic device. The method includes: acquiring a first touch event by using a first touch panel, where the first touch event is input information that is triggered by a touch gesture on the first touch panel and is incompatible with an interface of third-party application software; when the electronic device detects that currently displayed application software is third-party application software, acquiring a first instruction corresponding to the first touch event, where the third-party application software is application software that is installed in the electronic device and is developed by a third party and not by a manufacturer of the electronic device; and running the third-party application software according to the first instruction.
Huawei Device Co., Ltd.


Confidential route monitoring with traveler-configured traveler safety alerts


A user's travel is securely monitored using user-configured secure travel monitoring constraints within a secure travel profile. The user-configured secure travel monitoring constraints granularly specify controls related to user travel privacy and authorized release of travel information to a user-specified trusted third party in association with the user's travel, in addition to specifying a planned travel route and a planned travel time frame.
International Business Machines Corporation


Method for preventing relay attack on vehicle smart key system


A method for preventing a relay attack of a smart key system for a vehicle according to the present invention accurately calculates a current spaced distance between an smk unit and a fob key by using an rssi included in a response signal and a current voltage level in a process of decoding the response signal when the fob key carried by a user receives a signal applied from the smk unit installed in a vehicle and then transmits the response signal having at least two kinds of information to the smk unit, and detects a challenge signal applied from the smk unit installed in the vehicle and a noise signal included in the response signal, thereby enabling an operation of the vehicle only in a state where the carrier of the fob key secures a predetermined visual distance from the vehicle, and more definitely preventing a third party from breaking into the vehicle through rf bi-directional authentication.. .
Dae Dong Co., Ltd.


A method, process and system for facilitation and management of real estate transactions


A process to facilitate the reservation of a right to sell a piece of real estate, wherein said process includes the following steps: a first party publishing a listing of a piece of real estate; wherein the listing at least includes information selected from the following group of data relevant to the piece of real estate: address; lot number; current status reservation fee; and price data; and wherein the first party approves at least one second party; the second party who interacts with said listing by indicating their intention to reserve the said right; the second party pays a reservation fee to the first party; and a second party arranges for the sale of the piece of real estate from the first party to a third party.. .
Realestate.com.au Pty Ltd


System and making and tracking charitable contributions


A method and system of instructing an annex operation linked to the execution of a main transaction in a bank payment system comprising, for example, at least two distinct client devices and a third party device connected to an annex operation managing system, that is configured to carry out a main transaction between the two client devices. After having received from the third party device, in the annex operation managing system, information relative to the execution of the main transaction between the two client devices, at least one rule for executing the annex operation is identified according to at least one first information item of the received information.
Heoh


Message control system


Embodiments are presented for controlling usage of a communications device, whereby for a given number of messages generated from the device the operator (e.g., a child, person, etc.) has to successfully answer a question before a further batch of messages can be sent. The number of messages that can be sent before a question is to be answered can be configured by a parent.

Comment plug-in for third party system


In particular embodiments, one or more computing devices associated with a third-party system generate a web page comprising one or more references configured to cause a client device to send a request to a web site of a social-networking system to access a user comment, wherein the user comment is associated with content on a third-party web site hosted by the third-party system. The request comprises a first url that references the web site of the social-networking system, and the first url comprises a second url that references the third-party web site and comprises a content identifier for the content, and the request is to cause the web site of the social-networking system to access the user comment in a data store of the social-networking system.
Facebook, Inc.


System and providing medical information


A computer system and method for providing medical information to medical professionals. The system includes a wearable information storage system having a unique serial number that is securable around a user's wrist.

Source-to-processing file conversion in an electronic discovery enterprise system


Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. Embodiments herein disclosed provide for an enterprise-wide e-discovery system that provides for source-to-processing file conversion of electronic communications and, in some embodiments, decryption of encrypted electronic communication entries for the purpose of efficiently processing data and supplying the electronic data to third party data analysis providers..
Bank Of America Corporation


Method and system for assessing a message in a decentralized communication network


A method for assessing a message transmitted between at least: two parties via a previously unknown third party in a decentralized communication network, wherein all parties share a common trust architecture, includes publishing, on-behalf-of indication and public, security information of the third party; publishing, the message of the first party; evaluating the published information to extract published content of the first party by the second party as intended receiver of the message; verifying a real-world-identity of the third party and/or the signature of the third party based on the previously received trust information and/or based on the self-certifying name and the public security information of the third party; checking a trust information chain according to the common trust architecture from the second party to the third party; and assessing the content of the first party based on the checked trust chain.. .

Method, system and device for enabling an object to access a third party asset


Provided is a computer implemented method for a vehicle used in a car share journey to access priority parking spaces in a carpark. The method includes the step of obtaining location and time data for a mobile electronic device of a user/driver of the vehicle and for a mobile electronic device of at least one other user.

Hybrid network based metering server for a shared service and tracking client for wireless services


A process of modifying a usage allotment of a shared subscription in a third party wireless network includes implementing a metering system in a network separate from the third party wireless network and activating a plurality of wireless devices associated with the shared subscription in response to identification of each of the plurality of wireless devices and confirmation of use of a respective tracking system that tracks a respective usage allotment for each of the plurality of wireless devices on the metering system. In addition, the process includes receiving a change request to reallocate the respective usage allotment for at least two of the plurality of wireless devices and forwarding modification instructions to the at least two wireless devices.

Executing requests for services using shared location data


Exemplary methods, apparatuses, and systems receive, from a first user device associated with a first user, location data representing a current physical location of the first user. A request for the current physical location of the first user is received from a second user device associated with the second user.

Secure neighbor discovery (send) using pre-shared key


An extension is provided to the send protocol without requiring a cga or third party trust anchor. A shared key is provided to both a sender and receiver of a neighbor discovery (nd) message.

Method and securely transmitting communication between multiple users


A computer driven apparatus comprising at least one client device, where this client device is capable of managing and storing data. The apparatus further comprises a central location for managing subscriptions, addresses and public encryption keys.

Filtering notifications from a third party application to a user of a social networking system based on an action of the user


A method for filtering a notification being provided from an application to a user of a social networking system based on an action of the user is described. The method starts by receiving the notification from the application to the user.

Progressive jackpot alerts in a gaming system


Various embodiments are directed to a gaming system capable of providing periodic progressive level alerts or promotions. In one embodiment, the user is able to register for a progressive level alert.

Systems and methods for creating dynamic programmable credential and security cards


A dynamic credential card system for interoperating with multiple different point-of-sale systems is disclosed. The system comprises three computer systems: a dynamic digital value transfer system operating on a server, a dynamic digital value transfer application operating on a mobile digital device, and a small programmable dynamic credential card system.

Authentication system of synchronizing instant timestamp and a method thereof


The present invention is related to an authentication system of synchronizing instant timestamp issued by a digital timestamp device and a method thereof. The digital timestamp device provides an instant machine time, and the provider end uses the digital timestamp device to stamp an instant digital timestamp on a digital content.

Bookmarking search results


Methods and systems are directed to receiving a user instruction to display a set of bookmarked search results. One or more bookmark result objects can be obtained in response to the user instruction, each bookmark result object respectively corresponding to a previously received search result that a user selected for bookmarking and including one or more parameter values previously entered by a user and reference data to obtain content from a third party resource.

Location-based, server assisted peer to peer service with extensible service categories


Peer-to-peer service agreements can be facilitated by a third party without the terms of the service agreement being brokered by the third-party. In one example, a user sends a service request to a network node maintained by the third-party.

System and device pairing transaction


A provisioning mechanism that may be used when a device is distributed to a third party over an untrusted distribution channel. The provisioning mechanism allows a server to recognize and trust the remote device.

Method and system for providing a way to verify the integrity of a document


Method for providing a way to verify the integrity of a document. The invention is characterised in that the method comprises the following steps: a) publishing the document with a visibly embedded piece of information; b) providing a communication channel over which a third party can send a depiction of the published document to the central server; c) accepting said depiction of the published document in the central server, and finding, in the central server and based upon the piece of information, the document; and d) if the document was found in the central server, communicating to the third party that document itself and/or information pertinent to that document.

System architectures and methods for radiobeacon data sharing


Remote actuation of machines or machine systems is realized by a system for coupling a radiobeacon to a smart device and in turn to a broader network. The smart device is configured as a proximity-actuated “community nodal device” by an application that operates as part of the system.

Generating device, generating method, and non-transitory computer readable storage medium


A generating device according to the present application includes an acquisition unit, and a generation unit. The acquisition unit acquires information concerning a company from information transmitted on a communication network.

Prompting a user to purchase items for use in an application in a feed of content provided by an online system


An online system receives an advertisement (“ad”) request identifying an application, one or more items for use within the application, ad content, and a prompt for purchasing one or more of the items. The prompt for purchasing an item comprises text or image data describing the purchasing and instructions that, when executed by a client device, request payment information from a user accessing the prompt.

Secure payment service and system for interactive voice response (ivr) systems


A secure payment method includes receiving, by a payment recipient, a transaction request from a party in a transaction. The payment recipient requests a payment that is in a specified form and that is uniquely identified by a unique identification.

Estimation of third party inventory


Exemplary methods, apparatuses, and systems receive a browsing request to view an item offered by a first third party retailer. An estimated inventory value for the item at the first third-party retailer is retrieved.

Independent access to virtual machine desktop content


Methods, systems, and techniques for facilitating access to content stored remotely, for example, as part of a virtual machine infrastructure or elsewhere in a networked environment, using a uniform mechanism are provided. Example embodiments provide an enhanced virtual desktop management server/system with a content abstraction layer which enables users to access their data stored as part of a virtual machine environment, or replicated otherwise on a network, using a generic api.

Golf jersey


A golf jersey comprises a shirt having a collar with at least one digit on the back of the jersey. Such a jersey can expand into a matched set that provides recognition of a golfer and provides advertisements and financial benefits to the golfer, other individuals, or an organization, without necessarily requiring third party endorsements.

Automated onsite information search and multimedia method and system


The invented method and system consists of a software application installed on a mobile device with internet connection and a geographical positioning device; a remote server and or an onsite wireless communication apparatus. The software application communicates and transfers data with the remote server or the onsite wireless communication apparatus.

Third witness video participation system and method


A video recording and law enforcement corroboration process. A video feed is established between a law enforcement officer and a perpetrator, initiated by either party.
Virtual Health Systems Corporation


Method and procedure for dynamic services orchestration that runs within an on-device software container


A system for providing network services is provided. The system includes a device configured to interface with the network to receive a container, where the container is configured to interface with an operating system of the device and a plurality of applications operating on the device.
Reliance Jio Infocomm Usa, Inc.


Method and system for sharing two-factor authenticators to access electronic systems


A storage server is provided and configured to: receive a time-based access code from a computing device of a customer having an account with a resource provider, the time-based access code to be valid during a future time window and including a secret value provided by the resource provider; store the time-based access code; generate a url linked to the stored time-based access code; send the url to the customer to send to the third party to send to the storage server; receive the url from the third party; and send the time-based access code to the third party only if the url is received during the time window, whereupon the third party attempts to log into the resource provider and gains access to the account of the customer if the resource provider verifies the secret value and the time at which the login by the third party is attempted.. .

Digital assistant voice input integration


A digital assistant supported on devices such as smartphones, tablets, personal computers, game consoles, etc. Includes an extensibility client that exposes an interface and service that enables third party applications to be integrated with the digital assistant so the application user experiences are rendered using the native voice of the digital assistant.
Microsoft Technology Licensing, Llc


Authentication and verification services for third party vendors using mobile devices


A method to provide authentication services to third party vendors by a service provider hosting an authentication, authorization and accounting (aaa) server or a similar device that can authenticate users for some other service. This method enables easy and substantially error-free end-user authentication, which forms the basis for enabling electronic transactions (e.g., web-based) that are less vulnerable to fraud..
Alcatel Lucent


Methods and systems for providing promotional video


A computer system and implemented method for distributing job application video includes: receiving an applicant's identifying information and creating an applicant account; receiving a video of an applicant and associating the video with the applicant account; indexing the video of the applicant and adding the applicant's identifying information to a searchable database for third party viewers, wherein the third party viewers are registered; providing the third party viewers access to the video of the applicant upon request by the applicant and/or the third party viewer; and tracking third party views of the video and updating a status of the applicant account with each third party view.. .

Source-to-processing file conversion in an electronic discovery enterprise system


Embodiments of the invention relate to systems, methods, and computer program products for improved electronic discovery. Embodiments herein disclosed provide for an enterprise-wide e-discovery system that provides for source-to-processing file conversion of electronic communications and, in some embodiments, decryption of encrypted electronic communication entries for the purpose of efficiently processing data and supplying the electronic data to third party data analysis providers..
Bank Of America Corporation


Vehicle monitoring system


A vehicle monitoring system configured to cause a vehicle to perform a corrective action if a dangerous vehicle interior condition is detected and an occupant is present. The vehicle monitoring system monitors the temperature and gas, such as co2, and compares the levels of each to a threshold value.

Apparatus and methods for providing content to an ip-enabled device in a content distribution network


Apparatus and methods for providing content to ip-enabled devices in a content distribution network. In one embodiment, a network architecture is disclosed which enables delivery of content to such ip-enabled devices without the use of a high-speed data connection this capability allow the managed network operator to provide content services to an ip-enabled device associated with a non-data subscriber.
Time Warner Cable Enterprises Llc


Image coordination in a fleet of disparate imaging devices


Apparatus and methods coordinate imaging in a fleet of disparate imaging devices. Each imaging device is associated to a unique identifier.
Lexmark International, Inc.


System and call authentication


A system and method of authenticating voice calls by recording the call and generating a transcript of the recorded call. The invention includes a recording unit configured to record audio communications taking place on a communications device, and storing the recorded call as an audio file.



Third Party topics:
  • Third Party
  • Cloud Computing
  • Data Storage
  • Search Engine
  • Internet Of Things
  • Database Server
  • Data Processing
  • Documentation
  • Information Technology
  • Digital Content
  • Social Media
  • Content Provider
  • User Interface
  • User Input


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Third Party for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Third Party with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.0802

    4842

    0 - 1 - 103