Patent application number | Description | Published |
20110093318 | VIRAL DISTRIBUTION AND TRACKING OF ELECTRONIC COUPONS - Distributing and tracking electronic coupons based on proximity. Upon detecting recipients proximate to a computing device, one or more electronic coupons are selected and transmitted to the detected recipients. The transmittal occurs via a wireless connection in some embodiments. Coupon properties associated with the transmitted coupons are adjusted (e.g., values decreased, expiration conditions modified, location of transmittal, etc.). Distribution data for the transmitted coupons is stored to maintain a distribution history. | 04-21-2011 |
20110131172 | IDENTIFYING GEOSPATIAL PATTERNS FROM DEVICE DATA - Determining geospatial patterns from device data collected from a plurality of computing devices. The devices represent, for example, a plurality of sources providing the device data. The device data describes the computing devices and/or environments thereof. Some embodiments present the determined patterns to users for editing, update maps with the edited patterns, and distribute the maps to the users. The maps are stored to create a searchable map library. | 06-02-2011 |
20110269444 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20110269445 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20120035989 | PERSONALIZATION OF A MOBILE COMMUNCATION DEVICE - An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least partially cover its exterior. At least one graphic design is disposed on the exterior surface of the accessory body to convey a theme. A data tag is secured to the accessory. The data tag stores data that facilitates personalization of at least one functionality of the mobile communication device in support of the theme. The data tag being configured so that the data is accessible via a short-range wireless protocol such as the Near-Field Communication (NFC) protocol. | 02-09-2012 |
20120099727 | PROVISIONING TECHNIQUES - Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key. | 04-26-2012 |
20120143669 | LOYALTY OFFER MODELING - Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant. | 06-07-2012 |
20120143758 | Account Transfer Techniques - Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services. | 06-07-2012 |
20120144201 | SECURE ELEMENT AUTHENTICATION - Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware. | 06-07-2012 |
20120276992 | MOST VALUABLE PLAYER GAMER STATUS AND APPLICATIONS - A gaming environment is provided by an MVP gaming system provider in which “most valuable player” (MVP) gamers may compete. MVP gamers may be identified using achievements, gamer scores, game play during sanctioned gaming events, or other indicia of game skills. The MVP gamers may be sponsored by advertisers, and the MVP gamers' avatars may be branded based on sponsorship during gaming events. The sponsorships may be brokered by the MVP gaming system provider. Some gaming events may be sanctioned gaming events that are coordinated by the MVP gaming system provider and “televised” to allow viewers to watch the gaming events. Tutorials from MVP gamers may also be provided to gamers for viewing to assist in their game play. Further, gamers may be able to rent the avatars of MVP gamers for use during their game play. | 11-01-2012 |
20120278154 | MARKETING INVENTORY BASED ON SPOILAGE - An inventory marketing system operates to identify and market inventory items that are likely to spoil. Initially, inventory items that have a particular likelihood of spoilage may be identified. Customers to target with offers for the inventory items may be identified based on the customers' current location or expected location near a spoilage time for the inventory items. Offers for the inventory items may be provided to the targeted customers, and purchases of the inventory items by customers may be facilitated. | 11-01-2012 |
20130090064 | DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT - The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business. | 04-11-2013 |
20140040179 | IDENTIFYING GEOSPATIAL PATTERNS FROM DEVICE DATA - Determining geospatial patterns from device data collected from a plurality of computing devices. The devices represent, for example, a plurality of sources providing the device data. The device data describes the computing devices and/or environments thereof. Some embodiments present the determined patterns to users for editing, update maps with the edited patterns, and distribute the maps to the users. The maps are stored to create a searchable map library. | 02-06-2014 |