Patents by Inventor Dean Alderucci

Dean Alderucci has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20070112633
    Abstract: A POS terminal receives a signal that indicates an item, for example, via a bar code scanner. The POS terminal ascertains whether the item is associated with an offer for a rebate. If so, a code is generated and output to the customer, such as on a printed receipt. The code is associated with an offer for a rebate in exchange for establishing a subscription to a periodical. If the customer subscribes to a required periodical, he will be credited the amount he paid for the item. Subsequently, the customer requests a subscription to a periodical from a subscription fulfillment house, and provides his code in conjunction with the request. If the code is valid, the customer is provided with a rebate. The rebate may be provided directly by the subscription fulfillment house (e.g. a credit to a credit card account) or may be provided by a merchant (e.g. a discount on a future purchase).
    Type: Application
    Filed: December 18, 2006
    Publication date: May 17, 2007
    Inventors: Jay Walker, Andrew Van Luchene, Deirdre O'Shea, Dean Alderucci
  • Publication number: 20070073774
    Abstract: A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints.
    Type: Application
    Filed: June 1, 2006
    Publication date: March 29, 2007
    Inventors: Jay Walker, Daniel Tedesco, John Packes, Stephen Tulley, Kieth Bemer, Dean Alderucci, Marc Kessman, James Jorasch
  • Publication number: 20070073773
    Abstract: A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints.
    Type: Application
    Filed: June 1, 2006
    Publication date: March 29, 2007
    Inventors: Jay Walker, Daniel Tedesco, John Packes, Stephen Tulley, Kieth Bemer, Dean Alderucci, Marc Kessman, James Jorasch
  • Publication number: 20070070213
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 29, 2006
    Publication date: March 29, 2007
    Inventors: Daniel TEDESCO, James Jorasch, Geoffrey Gelman, Jay Walker, Stephen Tulley, Vincent O'Neil, Dean Alderucci
  • Publication number: 20070073775
    Abstract: A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints.
    Type: Application
    Filed: June 1, 2006
    Publication date: March 29, 2007
    Inventors: Jay Walker, Daniel Tedesco, John Packes, Stephen Tulley, Kieth Bemer, Dean Alderucci, Marc Kessman, James Jorasch
  • Publication number: 20070050083
    Abstract: Some embodiments are associated with receiving, by a vending machine, a request from a customer to initiate a communication session, establishing a first communication link between the vending machine and a device associated with the customer, and establishing a second communication link between the vending machine and a remote network device, such that a communication session is established between the device associated with the customer and the remote network device. Some embodiments are associated with receiving, by a vending machine, an indication of a selection of a product sold by the vending machine, receiving, from a customer, payment for the selected product, dispensing the product to the customer, the product comprising an indication of a communication session activation code, receiving, by the vending machine, an indication of the communication session activation code, and establishing a communication session between a device associated with the customer and a remote network device.
    Type: Application
    Filed: March 15, 2006
    Publication date: March 1, 2007
    Inventors: Paul Signorelli, Sih Lee, Paul Breitenbach, Daniel Tedesco, Dean Alderucci
  • Publication number: 20070050711
    Abstract: A method for providing a link in an electronic file being presented to a user which includes defining a customized viewpoint for the user. The viewpoint includes a preference for the user that provides an association between a data pattern and a computer network resource. The method also includes generating a request for content, receiving an electronic file in response to the request, and evaluating the electronic file to recognize a match between at least one portion of the electronic file and the data pattern. Upon recognizing a match, the electronic file is modified to include a link to the computer network resource associated with the matching data pattern, and the modified electronic file is presented to the user. Thus, the link included in the electronic file presented to the user is customized for the user, and different users who retrieve the same content can be provided with links to different computer network resources depending on their respective viewpoints.
    Type: Application
    Filed: November 4, 2005
    Publication date: March 1, 2007
    Inventors: Jay Walker, Daniel Tedesco, John Packes, Stephen Tulley, Kieth Bemer, Dean Alderucci, Marc Kessman, James Jorasch
  • Publication number: 20070016535
    Abstract: One embodiment of the present invention provides for a method comprising determining sales data associated with a sales device (e.g., a vending machine) and adjusting a level of sensitivity of a currency validator based on the sales data.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 18, 2007
    Inventors: Daniel Tedesco, Dean Alderucci, James Jorasch, Jay Walker, Michael Downs
  • Publication number: 20070012542
    Abstract: One embodiment of the present invention provides for a method comprising determining sales data associated with a sales device (e.g., a vending machine) and adjusting a level of sensitivity of a currency validator based on the sales data.
    Type: Application
    Filed: July 10, 2006
    Publication date: January 18, 2007
    Inventors: Daniel Tedesco, Dean Alderucci, James Jorasch, Jay Walker, Michael Downs
  • Patent number: 7162434
    Abstract: A POS terminal receives a signal that indicates an item, for example, via a bar code scanner. The POS terminal ascertains whether the item is associated with an offer for a rebate. If so, a code is generated and output to the customer, such as on a printed receipt. The code is associated with an offer for a rebate in exchange for establishing a subscription to a periodical. If the customer subscribes to a required periodical, he will be credited the amount he paid for the item. Subsequently, the customer requests a subscription to a periodical from a subscription fulfillment house, and provides his code in conjunction with the request. If the code is valid, the customer is provided with a rebate. The rebate may be provided directly by the subscription fulfillment house (e.g. a credit to a credit card account) or may be provided by a merchant (e.g. a discount on a future purchase).
    Type: Grant
    Filed: March 2, 1999
    Date of Patent: January 9, 2007
    Assignee: Walker Digital, LLC
    Inventors: Jay S. Walker, Andrew S. Van Luchene, Deirdre O'Shea, Dean Alderucci
  • Publication number: 20060287072
    Abstract: After a player purchases a contract providing insurance against gambling losses, a server or other device in communication with a gaming device (e.g., a “player tracking” server, “slot accounting” server and/or other computer device) may operate to (i) receive game play data in association with one or more plays of the gaming device, (ii) determine a compliance status based on the received game play data and one or more play requirements associated with the contract, and (iii) provide a refund amount due to the player based on the compliance status. Before providing any refund, the server or other device may store a status indicator relating to the one or more plays indicating whether the play was compliant with the contract. Furthermore, an alert may be provided to the player if a particular play is not compliant with the contract.
    Type: Application
    Filed: May 15, 2006
    Publication date: December 21, 2006
    Inventors: Jay Walker, James Jorasch, Geoffrey Gelman, Stephen Tulley, Daniel Tedesco, Robert Tedesco, Dean Alderucci
  • Publication number: 20060248028
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 26, 2006
    Publication date: November 2, 2006
    Inventors: DANIEL TEDESCO, JAMES JORASCH, GEOFFREY GELMAN, JAY WALKER, STEPHEN TULLEY, VINCENT O'NEIL, DEAN ALDERUCCI
  • Publication number: 20060245622
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 26, 2006
    Publication date: November 2, 2006
    Inventors: Daniel Tedesco, James Jorasch, Geoffrey Gelman, Jay Walker, Stephen Tulley, Vincent O'Neil, Dean Alderucci
  • Publication number: 20060248027
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 26, 2006
    Publication date: November 2, 2006
    Inventors: Daniel Tedesco, James Jorasch, Geoffrey Gelman, Jay Walker, Stephen Tulley, Vincent O'Neil, Dean Alderucci
  • Publication number: 20060239546
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 29, 2006
    Publication date: October 26, 2006
    Inventors: Daniel Tedesco, James Jorasch, Geoffrey Gelman, Jay Walker, Stephen Tulley, Vincent O'Neil, Dean Alderucci
  • Publication number: 20060239545
    Abstract: Disclosed herein are systems and methods for facilitating the usage of an online workforce to remotely monitor security-sensitive sites and report potential security breaches. In some embodiments, cameras are configured to monitor critical civilian infrastructure, such as water supplies and nuclear reactors. The cameras are operatively connected to a central computer or series of computers, and images captured by the cameras are transmitted to the central computer. After initially registering with the central computer, Guardians “log on” to a central website hosted by the central computer and monitor the images, thereby earning compensation. In one embodiment, images of “no-man” zones—areas where no humans or vehicles should be present or monitored—are sent to Guardians for a simple determination of whether or not a human exists in the picture.
    Type: Application
    Filed: June 29, 2006
    Publication date: October 26, 2006
    Inventors: Daniel Tedesco, James Jorash, Geoffrey Gelman, Jay Walker, Stephen Tulley, Vincent O'Neil, Dean Alderucci
  • Publication number: 20060236357
    Abstract: A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method.
    Type: Application
    Filed: June 16, 2006
    Publication date: October 19, 2006
    Inventors: Jay WALKER, Daniel Tedesco, Dean Alderucci, Magdalena Fincham
  • Publication number: 20060225112
    Abstract: A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method.
    Type: Application
    Filed: June 16, 2006
    Publication date: October 5, 2006
    Inventors: Jay WALKER, Daniel TEDESCO, Dean ALDERUCCI, Magdalena FINCHAM
  • Publication number: 20060225111
    Abstract: A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method.
    Type: Application
    Filed: June 16, 2006
    Publication date: October 5, 2006
    Inventors: Jay WALKER, Daniel TEDESCO, Dean ALDERUCCI, Magdalena FINCHAM
  • Publication number: 20060225113
    Abstract: A system and method are disclosed for a central server to manage remote monitoring tasks performed by users of a data network. An exemplary method comprises: receiving a request from a user of a user device to monitor a remote location; determining a remote location to be monitored; enabling communication between a sensor at the remote location and the user device; and crediting value to the user in accordance with an amount of time the user device has been in communication with the remote sensor for remote monitoring purposes. An alternate exemplary method includes measuring user attentiveness while the user device is in communication with the remote sensor. Thus, the disclosed system and method provide a way for users of a data network such as the Internet to log on at any time and perform remote monitoring tasks for value. Idle time can now be turned into value using the disclosed system and method.
    Type: Application
    Filed: June 16, 2006
    Publication date: October 5, 2006
    Inventors: Jay WALKER, Daniel TEDESCO, Dean ALDERUCCI, Magdalena FINCHAM