Follow us on Twitter
twitter icon@FreshPatents

Third Party patents

Bulk PDF Downloads
      

This page is updated frequently with new Third Party-related patent applications.




 Mobile communication method patent thumbnailMobile communication method
To protect a key (k_enb-int) and a key (k_enb-enc) that are used in a radio base station (menb), even when a malicious third party has stolen a key (k_senb) from a radio base station (senb). A mobile communication method according to the present invention includes, upon starting “inter-enb ca” configured such that downlink data is distributed to the radio base station (menb) and the radio base station (senb) by a serving gateway device (s-gw), generating, by the radio base station (menb), the key (k_senb) based on a key (kenb) and transmitting the key (ksenb) to the radio base station (senb), and generating, by the radio base station (senb), a key (k_senb-enc) and a key (k senb-int) used for communication with a mobile station (ue) in the “inter-enb ca”, based on the key (k_senb)..
Ntt Docomo, Inc.


 Personally attended service notification based on temporal and spatial proximity patent thumbnailPersonally attended service notification based on temporal and spatial proximity
A computer system may notify a user about personally attended services satisfying temporal-spatial criteria. The computer system may use a user location and/or information on already scheduled events to determine whether a personally attended service satisfies the temporal-spatial criteria.

 Call center system for personalized services patent thumbnailCall center system for personalized services
A call center system comprising a hub call center system, a number of spoke call center systems and third party resources. The hub call center system is configured to connect a communication received from a client device through communication channels provided by the hub call center system over a network with an associate of the hub call center system to deliver personalized services to a registered user.

 Method and system for generating exchangeable user profiles patent thumbnailMethod and system for generating exchangeable user profiles
A profile of a user may be constructed having at least one profile entry. A device having an integrated sensor assembly including at least one sensor may be associated with the user and operated according to a sensor configuration.
Invensense, Inc.


 System and  direct investing patent thumbnailSystem and direct investing
In one embodiment, a method comprising receive a list of one or more companies that one or more firms have invested in, analyze one or more companies based on an algorithm, where the algorithm comprises one or more parameters of percentage ownership, timing and size of a next financing, size of pro rata rights of the next financing, and projected financials, assign the one or more companies a first ranking based on the analysis, compare the first ranking with a second ranking of the one or more companies received from a third party database, and assign a third ranking based on the comparison of the first ranking and the second ranking.. .
Nav.vc


 Selecting content for presentation to online system users based on correlations between content accessed by users via third party systems and interactions with online system content patent thumbnailSelecting content for presentation to online system users based on correlations between content accessed by users via third party systems and interactions with online system content
An online system tracks stores information identifying content provided by third party systems and accessed by online system users as well as interactions with advertisements performed by online system users. When the online system identifies an opportunity to present an advertisement to a viewing user, the online system identifies content from third party systems accessed by the viewing user and content from third party systems accessed by additional online system users who interacted with advertisements.
Facebook, Inc.


 Tokenization of user accounts for direct payment authorization channel patent thumbnailTokenization of user accounts for direct payment authorization channel
Embodiments of the present invention disclose a financial institution system maintained by a financial institution and for tokenization of user accounts for using a direct payment authorization channel, whereby a third party payment authorization network is avoided. Embodiments establish a direct channel of communication between the system and a merchant or a merchant network in communication with the merchant; wherein the direct channel of communication comprises a network communication channel without a third party payment authorization system; receive a token issued by the financial institution and associated with a user account associated with a customer of the financial institution; receive transaction data comprising an amount associated with a transaction between the customer of the financial institution and the merchant; and determine whether to authorize the transaction based on the received token and the received transaction data..
Bank Of America Corporation


 Embedded third party server bypass security feature patent thumbnailEmbedded third party server bypass security feature
A process for managing a payment transaction between a payor and payee is described. A payment processing interface hosted by a transaction server not controlled by the payee is embedded within a user interface of the payee.
Quisk, Inc.


 Currency pricing and setilement patent thumbnailCurrency pricing and setilement
A computerized system including a first processor to determine a difference between an actual settlement and a respective expected settlement for each of a plurality of client transactions, each client transaction having an expected settlement in a first currency and a transaction price in a second currency under which the transaction is performed, the transaction price being determined from the expected settlement using a respective time-limited guaranteed exchange rate between the first and second currencies, and each actual settlement in the first currency being determined from the transaction price using a third party exchange rate, such that for each client transaction any difference between an actual settlement and a respective expected settlement is at least in part due to a difference between the time-limited guaranteed exchange rate and the third party exchange rate; and a second processor to adjust, for each client transaction, a respective client account balance according to said difference.. .
The Royal Bank Of Scotland Group Plc


 Tokenization of user accounts for direct payment authorization channel patent thumbnailTokenization of user accounts for direct payment authorization channel
Embodiments of the present invention disclose a financial institution system maintained by a financial institution and for tokenization of user accounts for using a direct payment authorization channel, whereby a third party payment authorization network is avoided. Embodiments establish a direct channel of communication between the system and a merchant or a merchant network in communication with the merchant; wherein the direct channel of communication comprises a network communication channel without a third party payment authorization system; receive a token issued by the financial institution and associated with a user account associated with a customer of the financial institution; receive transaction data comprising an amount associated with a transaction between the customer of the financial institution and the merchant; and determine whether to authorize the transaction based on the received token and the received transaction data..
Bank Of America Corporation


Lost item recovery with reporting and notifying system


In one embodiment, a system and method for reporting lost items includes presenting a lost item reporting link associated with an entity having a plurality of different physical establishment locations; receiving a user selection of the lost item reporting link; presenting at a website, in response to the user selection of the lost item reporting link, a graphical user interface configured to solicit lost item recovery information, the website being associated with the entity having the plurality of different physical establishments; receiving the lost item recovery information via the graphical user interface; and transmitting the lost item recovery information to a third party online lost and found system.. .
Chargerback, Inc.


System and computer program product for coordinating and monitoring service providers


A system and computer program product for coordinating and monitoring service providers is disclosed which provides an electronic portal accessible by service requesters and service providers. Service requesters may request and hire service providers that are assigned to an event and location to provide services.

Systems and methods for presenting content


Systems and methods for providing content. In one embodiment, a method for providing user access to online content can be provided.
Outbrain Inc.


Digital electronic fetal heart rate and uterine contraction monitoring system


A digital electronic fetal heart rate and uterine contraction monitoring system with an electronic fetal monitor, a contraction monitoring sensor and a fetal heart rate sensor. A controller configured to receive fetal heart rate data and uterine contraction pressure, identify a contraction start time and end time, and calculate each rest interval in seconds between contractions.

Method and device for controlling transmitting power, and terminal


Provided are a method and device for controlling transmitting power, and a terminal. The method includes that: a strength value of a received wireless fidelity (wifi) signal is detected; a transmitting power value corresponding to the strength value of the received wifi signal is determined according to the strength value of the received wifi signal and a corresponding relationship between a strength value of a wifi signal and a transmitting power value; and the transmitting power is controlled according to the determined transmitting power value.
Zte Corporation


Computer system for distributed discovery of vulnerabilities in applications


In one aspect, the disclosure provides: a method comprising: inviting a distributed plurality of researchers to participate in one or more computer vulnerability research projects directed to identifying computer vulnerabilities of one or more networks and/or computers that are owned or operated by a third party; assessing reputation and skills of one or more of the researchers, and accepting a subset of the researchers who have a positive reputation and sufficient skills to perform the investigations of the computer vulnerabilities; assigning a particular computer vulnerability research project, relating to a particular network under test, to a particular researcher from among the subset of the researchers; using a computer that is logically interposed between the particular researcher and the particular network under test, monitoring communications between the particular researcher and the particular network under test, wherein the communications relate to attempting to identify a candidate security vulnerability of the particular network under test; validating a report of the candidate security vulnerability of the particular network under test that is received from the particular researcher; determining and providing an award to the particular researcher in response to successfully validating the report of the candidate security vulnerability of the particular network under test that is received from the particular researcher.. .
Synack, Inc.


Apparatus for verifying safety of resource, server thereof, and method thereof


According to an exemplary embodiment, an apparatus for verifying safety of a resource may include: a resource requester to request a resource to an origin server, whose origin is trustworthy; validation information storage to acquire the resource from the origin server, and store a unique identifier and a signature about a web resource of a cross-domain, which the resource refers to; a validation verifier to compare the unique identifier included in validation information and a unique identifier, which is received from the third party server that includes the cross domain, so as to check the authenticity of the web resource of the cross-domain; and a granter to check the authenticity thereof, determine whether the web resource is a web resource, whose safety is verified by the origin server, and grant an access to the web resource of the cross-domain.. .
Electronics And Telecommunications Research Institute


Transmitting appliance-specific content to a user device


Methods and systems are presented for transmitting appliance-specific content to a user device associated with an appliance. In some embodiments, a third party platform may serve as a secure intermediary between a user device associated with an appliance (e.g., an oven) and a third party appliance service provider (e.g., appliance manufacturer).
Grandios Technologies, Llc


System and quadratic, near-quadratic, and convex voting in various types of research and voting


A method for eliciting and aggregating truthful preferences of respondents, with steps of assigning a currency budget to a respondent and generating a user interface. The user interface: displays budgets for each respondent; displays choices among alternative outcomes for each respondent and a method for allocating votes among options by paying according to a quadratic function; displays the outcome of the voting for each respondent; enables a third party to select and contact respondents; enables the third party to observe voting choices and final voting outcomes; and enables the third party to control budgets and voting options..
Collective Decision Engines, Inc.


Systems and methods for online guarantorship of loans


A method of verifying information for underwriting, comprising: receiving initial information relating to an applicant of a loan and login details of a third party platform account of the applicant; accessing the third party platform account via a network using the login details; retrieving additional information from the third party platform account; comparing the initial information to the additional information; and calculating a risk coefficient of the loan based on the comparison.. .
Backed Inc.


Interface for configuring online properties


Systems, methods, and apparatus, including computer program products, for configuring online properties, such as content pages of a website, through an online user interface. A system generates the online user interface and receives, over a network and through the online user interface presented by a client device, a request to insert a restricted third party file into a user's online property.
Google Inc.


System and tracking car sales


A system and method for tracking car sales by a car seller. After selling a car to a car purchaser personal identifying information is obtained from the car purchaser.
Dealerx


Systems, method and machine-readable mediums for facilitating the sale of personal property


A computer-implemented process for facilitating the sale of personal property comprising, receiving, at a mobile device, a scan request to scan an identification code of a first personal property, activating a camera of the mobile device to capture a video stream of the identification code, capturing the video stream of the identification code using the camera of the mobile device, analyzing in real-time the video stream for an acceptable image, and providing for the disposition of the first personal property to a third party, wherein the disposition is selected from a group consisting of selling the first personal property, transferring the first personal property, and donating the first personal property.. .
Seatsafe, Inc.


Systems and methods for mobile workforce management system trusted agent work order processing


Systems and methods for mobile workforce management system (wms) trusted agent work order processing are presented whereby an agency requiring extra workforce resources of a third party provider (tpp) to perform and process work orders is granted tpp-appropriate limited access to work order data, uses its own tpp system in accord with its tpp workflows, and the tpp system workflows are translated back into wms work order data.. .
Trapeze Software Ulc


Method and system for determining hidden states of a machine using privacy-preserving distributed data analytics and a semi-trusted server and a third-party


A method classifies data to determine hidden states of a machine by first acquiring data from the machine in a client, which is permuting randomly, and then chaff is inserted before transmitting to server as private data. The server classifies the private data according to a hidden markov model to obtain permuted noisy estimates of states of the machine and the chaff, which are transmitted to a third party.
Mitsubishi Electric Research Laboratories, Inc.


Elevator communication gateway


A communication gateway device to facilitate communication between at least one elevator car, a call center system, and a third party device includes a cellular communication interface including a digital cellular interface and an analog cellular interface, a wired telephone communication interface including a digital wired telephone interface and an analog wired telephone interface, and an elevator communication interface to send and receive an elevator communication to and from at least one elevator communication device associated with the at least one elevator car, the elevator communication interface associated with the cellular communication interface and the wired telephone communication interface to send and receive the elevator communication to and from at least one of the call center system and the third party device via at least one of the digital cellular interface, the analog cellular interface, the digital wired telephone interface, and the analog wired telephone interface.. .
Otis Elevator Company


System and media presentation with dynamic secondary content


A method for presenting media with dynamic content to a first user includes obtaining information related to a current playback position on a playback timeline being presented to the first user, obtaining secondary content related to the media and associated with a second user, wherein the first user and second user are associated according to a third party database, storing the obtained secondary content in a memory, and generating and transmitting instructions for displaying a first indicator of the secondary content at a first position on the playback timeline to the first user, wherein the first position corresponds to a first timestamp associated with the secondary content.. .
Nbcuniversal Media, Llc


System and communications


A system, tool, device, method, are provided to allow for two parties to communicate with a third party observing. A communication with a specific entity is offered for sale or for auction via a website or web feed or twitter or other.
Greenroom, Inc.


Security threat information analysis


Methods, systems, and apparatus, including computer programs encoded on computer storage media, for analyzing data that includes security threat information. One of the methods includes identifying intelligence types that each categorizes a subset of data, associating, for each of the intelligence types, each of the subsets of data, which are categorized by the respective intelligence type, with the respective intelligence type, determining rules for a third party that each indicate that the third party should receive data associated with particular types of potential security threats and priority information for the data, determining, for each of the potential security threats indicated in the rules, a group of the subsets that include information associated with the respective potential security threat, assigning, for each subset in each of the groups, a priority to the respective subset using the priority information, and providing the determined subsets to the third party using the respective priorities..
Accenture Global Services Limited


Communicating notifications from a third party system to online system users via the online system


To allow a third party system to more particularly identify sets of users for distributing content, an online system receives data from a third party system identifying users of the online system who have authorized communication with the third party system and stores information authorizing communication between the third party system and the users in user profiles associated with the user. The online system receives a request from the third party system to transmit a notification to online system users satisfying criteria specified by the request.
Faceboook, Inc.


System and providing a certificate for network access


Provided is a system and method for providing a certificate, and more specifically a certificate for network access upon a second system. The method includes, identifying a first system having at least one processor and a plurality of users, each user having at least one attribute; receiving from a third party at least one required attribute for certificate based network access; receiving from a user known to the first system a request for certificate based network layer network access to a second system having at least one processor, the request having at least one identifier; querying the first system with the at least one identifier for attributes associated with the user requesting the certificate based network layer network access to a second system; evaluating the attributes associated with the user requesting the certificate to the at least one predefined attribute; and in response to at least one attribute associated with the user requesting the certificate correlating to the at least one predefined attribute, providing from a system other than the first system, as requested by the user a certificate with at least one characteristic for certificate based network layer network access on the second system, the second system distinct from the first system.
Cloudpath Networks, Inc.


System and computer method providing customizable and real-time input, tracking, and feedback of a trainee's competencies


System and computer-implemented method of facilitating real-time competency-based feedback by a trainer to a trainee in a training environment for independent professional practice. An interactive session is initiated during or immediately following an interaction in the training environment for independent professional practice where the trainer observes during the interaction the trainee interacting with a third party.
Foundation For Exxcellence In Women's Healthcare, Inc.


Post capture imagery processing and deployment systems


A post capture imagery processing system is provided. The system is for use with aerial imagery and includes a server having a processor and a memory and a software application providing instruction to the server to process the captured aerial imagery, such as spherical imagery.
Aerial Sphere, Llc


Use of stored search results by a travel search system


A method and apparatus are provided for a dynamic information connection search engine. User actions may be detected on at least one client system.
Kayak Software Corporation


Mapping and formatting input commands to a third party protocol


A method and apparatus of translating and mapping received commands between operating system languages and/or protocol-based languages. One example method may provide receiving an action initiated by an external source, such as a person or automated action selection operation.
Amx Llc


System and embedded cognitive state metric system


An embodiment of a method for enabling content personalization for a user based on a cognitive state of the user includes providing an interface configured to enable a third party to request cognitive state data of the user as the user interacts with a content-providing source; establishing bioelectrical contact between a biosignal detector and the user; automatically collecting a dataset from the user; generating a cognitive state metric; receiving a request from the third party for cognitive state data; transmitting the cognitive state data to the third party device; and automatically collecting a dataset from the user as the user engaged tailored content.. .
Emotiv Lifesciences Inc.


System and automatic third party user interface adjustment


A method for enabling a third party to dynamically reskin information displayed at a primary user device associated with a user account includes: transmitting a user interface template to a third party device, receiving assets from the third party device, delivering a bundle to a user device, and presenting the user interface based on the bundle.. .
Olio Devices, Inc.


Determination of a user context and sending of a third party proposition


A method comprising identifying a user account associated with a user, the user account referencing at least one third party user account associated with the user, receiving, by an apparatus from a separate apparatus, circumstantial information that is indicative of a user context of the user, determining the user context based on the circumstantial information, determining that the user context is classified by at least one user context classification that is associated with the third party user account, sending information indicative of the third party user account and the user context to a third party server, the third party server being associated with the third party user account, receiving a third party proposition from the third party server, and sending, to a user apparatus, the third party proposition in response to the receipt of the third party proposition is disclosed.. .
Nokia Technologies Oy


Trusted third party broker for collection and private sharing of successful computer security practices


A trusted third party broker collects information concerning successful computer security practices from multiple organizations, and privately shares collected information at an inter-organizational level. Information concerning empirically successful computer security practices is received from multiple source organizations.
Symantec Corporation


Method and system for secure distribution and tracking of information via multiple social networks


A method and system for secure distribution and tracking of information and content of a third party via multiple social networks is described. The invention takes information and content marked to be promoted by a third party using an online application, and distributes and promotes the information to the social networks of everyone who is signed up as an ‘ambassador’ for that third party.
Socialtoaster, Inc.


Synchronizing items for use in an application purchased in a feed of content provided by an online system with a third party system providing the application


An online system receives an advertisement (“ad”) request identifying an application, one or more items for use within the application, ad content, and a prompt for purchasing one or more of the items. The prompt for purchasing an item includes instructions that, when executed by a client device, request payment information from a user accessing the prompt.
Facebook, Inc.


Calculation of a third party solicitation fee


A method comprising calculating a third party solicitation fee for a third party, receiving, from a third party server, a third party solicitation on behalf of the third party, sending the third party solicitation to a user apparatus in response to the receipt of the third party solicitation, the third party solicitation comprising a request for a specified action, receiving information indicative of the user apparatus performing the specified action, and decreasing the third party solicitation fee based, at least in part, on the receipt of the information indicative of the user apparatus performing the specified action is disclosed.. .
Nokia Technologies Oy


System and chopping up and processing gift cards


Systems, methods, and computer-readable media for chopping up a gift card/code into smaller multiple gift card/codes. The system receives a request from a user to convert a closed-loop card/code having a value amount into two different closed-loop cards/codes and divides (or “chops up”) the closed-loop card/code into a first closed-loop card/code having a first value amount and a second closed-loop card/code having a second value amount, wherein the first value amount and the second value amount add up to no more than the value amount.
Giftcodes.com, Llc


System and creating managing and verifying postal correspondences


A system for creating, managing and verifying postal correspondences is disclosed. The system includes a plurality of non-transitory storage media information that includes a home page screenshot, a features page screenshot, a casemail™ screenshot and a pricing screenshot.

System and restricting system and application software available for installation on a managed mobile device


A method for managing software on a device is provided. The method comprises: receiving, from a third party associated with the device, by a software administrator of an organization different from the third party, release information regarding software versions for the device; creating, by the software administrator, a profile that specifies whether or not at least one of the software versions is allowed on the device; and transmitting the profile, by the software administrator to a server computer associated with the third or other parties, to promote enforcement of the profile for the device..
Blackberry Limited


Method and system for family plan sharing of wireless services


A system and process of sharing a wireless surface allotment in a third party wireless network includes implementing a metering system to meter wireless service usage by users of the third party wireless network and tracking wireless usage by a plurality of wireless devices associated with the metering system. The system and process further includes receiving a share request to reallocate the respective wireless service allotment for at least two of the plurality of wireless devices, forwarding modification instructions to the metering system, requesting confirmation from the metering system that the modification instructions have been received, and modifying the respective wireless service allotments for the at least two wireless devices in response to receiving confirmation from the metering system..
Tracfone Wireless, Inc.


System and method to enable pki- and pmi- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means - added


A central server configured with an attribute authority (“aa”) acting as a trusted third party mediating service provider and using x.509-compatible pki and pmi, vpn technology, device-side thin client applications, security hardware (hsm, network), cloud hosting, authentication, active directory and other solutions. This ecosystem results in real time management of credentials, identity profiles, communication lines, and keys.
T-central, Inc.


Distracting module system


A distracting module system includes a hydro pneumatic solution tank, a valve, a nozzle, a controller and a detecting system. The controller is programmed to receive a sensor alert signal from the detecting system and send an activation signal to the valve to regulate and control fluid movement from the hydro pneumatic solution tank through the valve and to the nozzle, and to deliver information related to the sensor alert signal and the activation signal to third party devices..
Crotega, Llc


Method and conducting focus groups using networked gaming devices


The invention includes a system and method for conducting a focus group via networked gaming devices. A slot server or a third party server in communication with gaming devices provides access to players operating the gaming devices.
Igt


Method for optimizing automated management of third party insurance claim processing and devices thereof


This technology optimizes management of third party insurance claim processing includes retrieving third party claim data associated with a selected third party claim and from an automatic integration with at least one additional insurance claim application initiated based on the selection of the third party claim. One or more customized claim management operations are executed based on the selected third party claim and at least a portion of the retrieved third party claim data.
Mitchell International, Inc.


Vehicle performance based on analysis of drive data


Data is collected during the operation of a vehicle and used to produce a ranking of a driver's performance, and that ranking is shared on a hosted website, such that the drivers can compare their performance metrics to their peers. Fleet operators can use these performance metrics as incentives, by linking driver pay with performance.
Zonar Systems, Inc.


Mobile communication device monitoring systems and methods


Systems and methods are directed to monitoring the communications to and from a mobile communication device in accordance with one or more embodiments. For example in accordance with an embodiment, data services on a mobile communication device, such as communications, application use, functionality, operability, and/or presence, may be monitored against rules available from a central data center repository.
Eagency, Inc.


Distribution of digital media files


Methods and systems are described for preparing digital media files containing visual and/or audio information for distribution, and for sharing the files so as to prevent unauthorised use and/or distribution. The method comprises: copying the digital media file to create a second media file; selecting at least one part of the second digital media file; removing the at least one part from the remainder of the second digital media file; processing the at least one part so as to obfuscate or camouflage the information therein, and inserting the at least one processed part into the remainder of the second digital media file to create a camouflaged digital media file.
The Panama Bureau Limited


Integration of intentional noise into a communication channel to simulate activity


An example method of simulating activity to conceal actual activity associated with a wireless network includes generating, at a push server, a sham push message operable to simulate activity on a communication channel between a push service provider and a target mobile device. The sham push message includes an indication that the sham push message is not an actual push message from a third party associated with the mobile application.
Red Hat, Inc.


Information sharing for third party applications in cellular telecommunication infrastructures


A method, system and computer program product are disclosed for providing content to a communications device. In an embodiment of the invention, a communications network receives a first content portion from a content provider and sends the first content portion to the communications device.
International Business Machines Corporation


System of third party control of network connected devices


A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer.
Honeywell International Inc.


System of demand response provider control of network connected devices


A system of controlling one or more building control devices. The system may incorporate receiving from a third party a request for access to a user account at a manufacturer of building control devices, where the user account may be associated with one or more of the user's building control devices from the manufacturer.
Honeywell International Inc.


Extension of third party application functionality for intent determination


Intent determination as a service (iaas) is disclosed. A third party application may be provided access to an iaas service.
Microsoft Technology Licensing, Llc


Universal call management platform


Systems, methods and computer program products for enabling integration between various internet- or non-internet based communication services (e.g., as provided by different communications platforms and service providers) using a universal platform are described. In some implementations, a service manager is provided that can integrate call management capabilities with multiple communications platforms using the universal platform to enable seamless communication between the various platforms.
Ringcentral, Inc.


System and a third party web-based application to build and automatically generate project web pages offering crowdfunding opportunities for artists


A system including one or more servers, each server communicably coupled to a first user device and a second user device, the one or more servers being configured to receive, from the first user device, information regarding a project of an artist, create project data based on the received information regarding the project, the project data comprising a name and at least one of a type, a language, a description, a start date, an estimated completion date, a prospective release date and/or a revenue goal, store the project data in a database of the one or more servers, and transmitting or providing, via a network or website, information associated with the stored project data to the second user device.. .
Artistshare, Inc.


System and direct response advertising


Systems and methods to gather information regarding user responses to advertising. The system determines and/or obtains information identifying a commercial good that is related to an advertisement presented to a user.
Direct Path, Llc


Authorizing access by a third party to a service from a service provider


Systems and methods are provided for authorizing third-party access to a specific service from a service provider. In an example embodiment, a server system identifies a shared service from multiple services provided by the server system.
Adobe Systems Incorporated


Systems and methods for facilitating mobile commerce interactions between customers and merchants


Systems and methods are provided for facilitating mobile commerce interactions between a customer and a merchant, whereby a customer, having initiated a mobile commerce transaction via a mobile device, arrives at a merchant location to complete the transaction. In some embodiments, an intermediate remote server is employed to facilitate communication between a third party app running on a customer mobile computing device, and an app-agnostic merchant computing device residing at a merchant location.
Lucova Inc.


System and methods for third-party access to a network-based system for providing location-based upcoming event information


A system and methods for third-party access to a network-based system for providing location-based upcoming event information are described. The location-based upcoming event information may be accessed from the network-based system by a server-side web application implemented by a third party.
Paypal, Inc.


Software license and installation process management within an organization


A software license and a software installation process are managed. A status of the license can be one of at least a third party reserved status, a requester reserved status, a requester allocated status, and an available status.
International Business Machines Corporation


Payment card reconciliation by authorization code


A payment processor acting on behalf of a third party administrator to make payment on an adjudicated claim makes a straight through payment to an acquirer for a health care provider's merchant account. Via the authorization process, the payment processor generates an authorization code which is returned to the health care provider on its merchant statement for the payment.
Stoneeagle Services, Inc.


Content sharing


Disclosed are embodiments of systems and methods that allow for the robust, flexible, and efficient sharing of content. In embodiments, content items may be associated with labels, tags, or other identifiers, third parties may be associated with labels, tags, or other identifiers, and sharing with the third party may be based upon comparisons of the labels, tags, or other identifiers associated with the content items and the labels, tags, or other identifiers associated with the third parties..
Start Project, Llc


External zero emissions indicator


A system for notifying a third party as to whether a vehicle is producing or generating emissions. The system includes an internal combustion engine capable of producing exhaust gases, an exhaust pipe coupled to the internal combustion engine and for allowing passage of the exhaust gases and a sensor positioned within the exhaust pipe and configured to determine a characteristic of the exhaust gases.
Toyota Motor Engineering & Manufacturing North America, Inc.


Rotary pill dispenser and use


An automated medication dispenser system is disclosed. The system includes a dispenser device comprising a medication dispensing and storage module, a dispensing drive and control mechanism, and a communications interface.
Msc Dispenser, Llc


Systems and methods for call backup and takeover using web and mobile interfaces


A telecommunications system for handling call volume, including an application with takeover ability loaded on a mobile device, updating the application when a call is being handled by a third party, and transferring the call when an option to takeover is chosen.. .
Gubagoo, Inc.


Method and system for communication devices


In one embodiment a user interface for a communication device is described, the user interface including a first icon representing a first communication event between a first party and a second party, and a second icon representing a second communication event between the first party and a third party, a processor to receive input signals from the first party, the signals input via the user interface, the processor, in response to the received input signals, performs one of a communication event transfer including transferring the first communication event from being between the first party and the second party to being between the second party and the third party, and a communication event merger including the creation of a merged communication event between the user, the second party, and the third party. Related methods, systems, and apparatuses are also described..
Cisco Technology, Inc.


Method and system for validating interfering signals


Systems, apparatus and methods for validating whether an interfering communications signal has been encountered by a node in a wireless communications network due to signals transmitted by a node operating in another wireless communications network. The wireless communications networks may operate as directional wireless communications networks.

Computer system for generating calculator interface elements for remote device display


Described are computer systems for interactions with a user device and third party computers. In an embodiment, a computer system for determining and displaying total loss calculations includes accessing third party computer systems for a plurality of data items.
Hartford Fire Insurance Company


System and process for rating crowdfunding campaigns and funding campaigns by crowdfunding websites with or without the help of user generated ratings scores


The invention is based on a business process operation for a crowdfunding portal or website creating a new funding process and an online community where a pool of funds is been created by a percentage of donation activities on its portal, is used to fund automated selected campaigns on the crowdfunding portal, based on an algorithmic calculated score generated by users activity for each campaign. This pool of funds is governed by selected members of the portal.
Funsidy Llc


Systems and methods for digital multimedia capture using haptic control, cloud voice changer, protecting digital multimedia privacy, and advertising and sell products or services via cloud gaming environments


Provided is a method for advertising and retailing products and services in cloud gaming environments. A game provider may configure its cloud gaming environment to display third party advertisement before, during, or after the game.

Method and system for embedding third party data into a saas business platform


Disclosed is an improved method, system, and program product to implement a business platform that assigns a server instance and dedicated database to each business customer. A connector is configured to retrieve data from an external data source.
Oracle International Corporation


Method and content presentation in association with a communication connection


A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party.

Switch controller for separating multiple portions of call


An example method includes providing third party access to listen to a call and the ability to inject audio into an isolated audio portion of the call by using a switch controller within a mobile virtual network operator (mvno) platform. The switch controller can to separate a call into multiple audio portions.
Tevnos Llc


Method and content presentation in association with a communication connection


A method and apparatus are provided for presenting content to a caller and/or a called party in association with a telephone call or other communication connection. Content may be presented pre-ring (before the called party's telephone rings), in-call, and/or post-call, and may be related to a party participating in the call or may be related to a third party.

Connecting radio base stations via a third party network


There is provided a radio base station suitable for a wireless communications network. The radio base station is arranged to request a local ip address from a dhcp server the request including a local port number.
Telefonaktiebolaget Lm Ericsson (publ)


Task completion in email using third party app


Among other things, one or more techniques and/or systems for providing a third party app through an email user interface are provided. That is, an email user interface may provide access to an email comprising email content (e.g., a message regarding meeting for dinner at the emerald tavern).
Microsoft Technology Licensing, Llc


System and integrating two-factor authentication in a device


A system and method for providing secondary-factor authentication with a third party application that can include enrolling a device application instance of an account into a secondary-factor authentication service on behalf of a service provider that includes at the secondary-factor authentication service, receiving a secondary factor of authentication enrollment request of an account, the request received from the service provider, transmitting an activation code, and pairing the device application instance with the account through the activation code; receiving an authentication request identifying the account; transmitting an authentication request to the device application instance paired with the account; validating a response to the application request; and transmitting an assessment to the service provider.. .
Duo Security, Inc.


Method of calculating route, and method or device for obtaining route


A method of determining whether there is a need to re-calculate a trip route including a departure point and a destination by using traffic information according to an embodiment of the present invention is provided. The method is performed by a server and includes: receiving the current position from a terminal when the terminal moves a specific distance from a previously reported position; obtaining the current position of a third party when the destination is the position of the third party defined as the identifier (id) of the third party; and determining whether there is a need to re-calculate the route according to a specific condition based on the obtained current position of the third party, wherein the specific condition is (1) when the third party moves a distance equal to or greater than a predetermined value from the previously reported position or (2) when the third party moves a distance equal to or greater than a predefined value from the previously reported position and the distance between the current position of the terminal and the current position of the third party is shorter than a critical value, and if one of the specific conditions is satisfied, it may be determined that there is a need to re-calculate the route..
Lg Electronics Inc.


External control lighting systems based on third party content


A computing system (200) and a method of generating data for enabling external control of a lighting system (100) comprising a plurality of light sources (101, 102) based on third party content are provided. The computing system is configured to receive a plurality of registrations of lighting systems and, for each of the registered lighting systems, information including indications of positions of at least some of the light sources of the lighting system, and to map the information onto a coordinate system.
Philips Lighting Holding B.v.


Provision of additional network addressable numbers on single mobile device


A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


Provision of additional network addressable numbers on single mobile device with no calling number identifier


A method and system are described for servicing a second line service (“sls”) based communication request originating from a subscriber's telecommunications device (“td”) even if the call signal does not include sufficient information to identify the phone number from which the subscriber initiated the call. The method involves associating the sls phone number of the subscriber, the primary number of the subscriber and the primary number of a third party via a special relationship number..
Movius Interactive Corporation


Participating in a peer-to-peer communication session


A third party automatically participates in a peer-to-peer communication session established between a first endpoint and a second endpoint. Once the peer-to-peer communication session is established, a third party receives a first user data provided by the first endpoint, and verifies the first user data.
International Business Machines Corporation


Telecommunications device enabled with multiple network recognizable numbers


A method for routing calls between a third party telecommunications device (“td”) and a subscriber td associated with a primary service and a second line service (“sls”) involves associating the sls number of the subscriber, the primary number of the subscriber and the primary number of a third party via a common relationship number. Calls directed from a third party to the sls number of a subscriber are routed to an sls platform and redirected to the subscriber td.
Movius Interactive Corporation


System and utilizing random and non-random based occurences for payouts on financial instruments


Disclosed is a debt repayment lottery/game system and method that allows a pool of players with existing loan debt such as student loans, mortgages, personal loans, credit card debt, automobile loans, boat loans, plane loans, investment loans, and other such debt. The winning payout is made to a third party versus the actual winner.
Sldr, Inc.


Performing an operation on a data storage


A method of performing an operation on a data storage for storing data being encrypted with a key kd associated with an owner of the data is provided. The method includes deriving, for each authorized client cj, a first key kcj and a second key ktj, providing the client cj with the first key kcj, and providing a trusted third party (ttp) with the second key ktj.
Telefonaktiebolaget Lm Ericsson (publ)


Contextual search using natural language


A context aware digital assistant supported on devices such as smartphones, tablet computers, wearable computing devices, personal computers (pcs), game consoles, and the like is configured with a natural language interface that enables a user to launch searches for content using contextual references such as time, date, event, location, schedule, activity, contacts, or device. The user can thus use natural language to express the context that is applicable to the sought-after content rather than having to formulate a query that uses a specific syntax.
Microsoft Technology Licensing, Llc


Method and system for locating an electronic device


A method and system for locating a target electronic device utilizes the wireless capabilities of multiple third party devices thereby allowing these devices to search for the target electronic device on a large scale. The third party devices electronically sense other electronic devices and report the location of the third part device when the target device is sensed..
Synchronoss Technologies, Inc.


Method and system for remote management of access to appliances


Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can include any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments for the appliance, and managing access to the appliance accordingly.
Payjoy Inc.


Method and system for remote management of access to devices


Embodiments described herein include methods and systems for remotely managing appliances, including enabling communication between a user of the appliance and third party systems. The third party systems can be any entity that has a relationship with the user of the appliance, such as a payment infrastructure handling incremental payments tier the appliance, or as content management entity (for example, helping parents to control access to digital content available to children).
Payjoy Inc.


Integrated experience for applications within a mobile application


A system and method that supports an integrated user interface experience with third party hosted applications selected and installed by a user within a user-installed native application of a user communication device.. .
Sears Brands, L.l.c.


System and an application distribution and metrics system enabling the integration of distrubuted applications into host applications and the monetizing of distributed applications


The present invention comprises an application distribution and metrics system as well as an application monetizing system (adms). The adms incorporates a cross-platform application distribution system and a usage-based and ad-based monetizing system which allows for fine-tuned usage-based pricing schemes to be created based on system-defined metrics and developer-defined metrics, seamless integration of ad-based monetizing, third party participation in monetizing efforts, and a flexible revenue allocation process..

Methods and systems for providing comprehensive cybersecurity protection using an open application programming interface based platform solution


Methods of providing cyber-security services to a plurality of customers include providing a platform that includes a software program that is configured to run on a processor to implement a user interface that is accessible by customers. The software program includes an application programming interface that is configured to allow a platform operator and third party providers to offer computer implemented cyber-security services to the customers through the user interface.
At&t Intellectual Property I, Lp


Information technology security assessment system


A method and system for creating a composite security rating from security characterization data of a third party computer system. The security characterization data is derived from externally observable characteristics of the third party computer system.
Bitsight Technologies, Inc.


Network security system with application for driver safety system


A driver safety system includes traffic signals communicating with a municipal controller via a first network and user devices communicating with a third party controller via a second network. Communications from the first network are provided to the second network via a repeater server providing one-way communications to avoid the possibility of hacking devices on the first network..
Connected Signals, Inc.


Emergency alert bracelet and use


An emergency alert bracelet for alerting others and drawing attention to the user when the user is in an emergency situation. The bracelet comprises a strap that can be adjustably secured on the wrist of a user.

Vehicle traffic and vehicle related transaction control system


A location enabled mobile wireless device and central system cooperate to provide traffic control such as vehicle inspection site services and toll station services. Traffic control information such as vehicle inspection site information and toll station information is independently processed by a third party provider and sent to the central system.
Intelligent Imaging Systems, Inc.


Minimum outcome assurance contracts from revenue sharing of royalties


Two new forms of financial instruments that can be offered by an issuing company at an initial public offering via an exchange or investment syndicate or otherwise, and, if used, a computerized exchange for trading. The instruments include fair revenue participation contracts (frpc) which provide investors with a right to receive a fixed percentage of the issuing company's revenue for a fixed length of time, in combination with a minimum payment guarantee underwritten by a third party guarantor which guarantees some minimum amount of royalty payments to investor, at least recouping their initial investment or resulting in some higher yield to investors.

System and providing technology-driven end-to-end managed security service products through a security marketplace


A platform provides customers with complete and compelling consumption-based service while using the information it gathers to improve the customer's experience. This capability includes cloud integration to monitor the customer's cloud workload which is then used to identify risks and make recommendations on how to mitigate those risks through the management of the customer's security infrastructure.
Leidos, Inc.


Searching data using pre-prepared search data


Methods and devices for searching are described. In one aspect, the method includes: receiving a search query; identifying a search data file associated with a third party application, the search data file being prepared according to predetermined format rules by the third party application, and stored, prior to receiving the search query; searching, at least a portion of the search data file using the search query to identify information that matches the search query; using the predetermined format rules to identify associated information in the search data file, the associated information being related to the information that matches the search query; obtaining search results from at least one other source; and generating a display of search results based on both the information matching the search query and the associated information, the display including the search results from the at least one other source..
Qnx Software Systems Limited


Methods, systems, and computer program products for recovering a password using user-selected third party authorization


A password recovery technique for access to a system includes receiving a request from a first party to recover the first party's password to access the system, receiving a selection of a second party from the first party, sending a message to the second party requesting that the second party authorize the request to recover the first party's password, receiving authorization from the second party for the request to recover the first party's password, and resetting the first party's password responsive to receiving authorization from the second party.. .
At&t Intellectual Property I, Lp


System and collaborative programming of data entry workflows between system developers, end users, and third party developers


The present invention is a system for collaborative programming of data entry workflows between end users, electronic health record (ehr) system developers, and third party developers. The system comprises application servers, database servers, an ehr, and peripheral devices, all stored in a distributed computing environment.
Nuesoft Technologies, Inc.




Third Party topics:
  • Third Party
  • Cloud Computing
  • Data Storage
  • Search Engine
  • Internet Of Things
  • Database Server
  • Data Processing
  • Documentation
  • Information Technology
  • Digital Content
  • Social Media
  • Content Provider
  • User Interface
  • User Input


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Third Party for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Third Party with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.9133

    4986

    1 - 1 - 106