Patents by Inventor Kenneth Jennings

Kenneth Jennings has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100198828
    Abstract: A system and method are provided for forming crowds of users and providing access to corresponding crowd data. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. The central system forms a crowd including a number of users based on the current locations of the number of users. The central system then generates crowd data for the crowd and provides access to the crowd data for the crowd. In one embodiment, the crowd data for the crowd includes an aggregate profile for the crowd. In another embodiment, the crowd data includes data characterizing the crowd. The central system provides access to the crowd data by serving crowd data requests.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
  • Publication number: 20100198814
    Abstract: Systems and methods are provided for filtering and/or creating Points-of-Interest (POIs). In one embodiment, a list of POIs is obtained and then filtered based on crowd data related to the list of POIs to provide a filtered list of POIs. In another embodiment, one or more crowd-sourced POIs are created based on one or more crowds relevant to a corresponding bounding region for POI creation.
    Type: Application
    Filed: January 21, 2010
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
  • Publication number: 20100198870
    Abstract: A system and method are provided for maintaining a historical record of anonymized user profile data for mobile device users and serving historical requests. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations and user profiles for users of mobile devices. The central system processes the current locations and the user profiles of the users over time to maintain a historical record of anonymized user profile data by location. By anonymizing the user data, privacy of the users of the mobile devices is maintained. The central system may then use the historical record of anonymized user profile data to respond to historical requests. The historical requests may be made by users of the mobile devices, subscribers, and/or third-party services.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Kenneth Jennings, Sean T. Purdy, Scott Curtis
  • Publication number: 20100198826
    Abstract: A system and method are provided for maintaining a historical record of anonymized user profile data for mobile device users. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations and user profiles for users of mobile devices. The central system processes the current locations and the user profiles of the users over time to maintain a historical record of anonymized user profile data by location. By anonymizing the user data, privacy of the users of the mobile devices is maintained. The central system may then use the historical record of anonymized user profile data to respond to historical requests. The historical requests may be made by users of the mobile devices, subscribers, and/or third-party services.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings, Sean T. Purdy
  • Publication number: 20100198917
    Abstract: A system and method are provided for forming crowds of users and providing access to corresponding crowd data. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. The central system receives a crowd request from a requesting device. In response, the central system establishes a bounding region for the request and identifies one or more crowds, each including number of users, that are relevant to the bounding region for the request. The central system then generates crowd data for the one or more crowds and returns the crowd data for the one or more crowds to the requesting device.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
  • Publication number: 20100197318
    Abstract: A system and method for tracking crowds of users are provided. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. Based on the current locations of the users, the central system forms crowds of users. As a result of movement of the users and corresponding location updates, the crowds move and change over time. In order to track at least some of the crowds, crowd snapshots for those crowds are created over time and stored. The crowd snapshots preferably maintain anonymity of the users in the crowd at the time the crowd snapshots are created. Thereafter, the crowd snapshots may be used to generate crowd tracking data for select crowds.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Steven L. Petersen, Kenneth Jennings, Sean T. Purdy
  • Publication number: 20100198862
    Abstract: A system and method are provided for processing a request for crowd data for a large geographic area. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices and form crowds of three or more users based on the current locations of the users. In order to provide access to crowd data for crowds for a large geographic area, the central system receives a request for crowd data from a requesting device, establishes a bounding region for the request, and identifies one or more starting points within the bounding region for the request. Crowds are identified, crowd data for the crowds is generated, and the crowd data is returned to the requesting device in an iterative manner for a series of two or more outwardly radiating, concentric geographic regions centered at the one or more starting points.
    Type: Application
    Filed: December 23, 2009
    Publication date: August 5, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Kenneth Jennings, Christopher M. Amidon, Ravi Reddy Katpelly
  • Publication number: 20100069144
    Abstract: A system and method are disclosed for providing location-based wagering. In one embodiment, wagerable data associated with a location of a first user is identified. The wagerable data may be any type of data on which a wager may be based. Then, a wager recommendation is generated based on the wagerable data and returned to the first user. The first user defines a wager, and the wager is published to one or more second users located in proximity to the first user. Each of the one or more second users is enabled to accept the wager if desired. In addition, one or more winners and one or more losers of the wager may be identified and payout may then be effected.
    Type: Application
    Filed: September 15, 2008
    Publication date: March 18, 2010
    Applicant: CONCERT TECHNOLOGY CORPORATION
    Inventors: Scott Curtis, Kenneth Jennings, Michael W. Helpingstine, Eugene Matthew Farrelly
  • Publication number: 20100015975
    Abstract: A system and method are provided for sharing rights-enabled user profiles among users in voice communication system, such as a mobile telecommunications system. In general, each user defines a user profile and associated access rights, where the user profile and access rights are stored by or accessible to a profile service. When a voice session, or call, is initiated between a first and second user, a device of the first user requests a profile of the second user from the profile service. In response, the profile service determines whether the first user has been granted access rights to the user profile of the second user. If so, the profile service provides the user profile of the second user, or a portion thereof, to the device of the first user according to the access rights of the first user, and the user profile is presented to the first user.
    Type: Application
    Filed: July 17, 2008
    Publication date: January 21, 2010
    Applicant: KOTA ENTERPRISES, LLC
    Inventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings, Hugh Svendsen
  • Publication number: 20100015976
    Abstract: A system and method are provided for sharing rights-enabled user profiles among users in voice communication system, such as a mobile telecommunications system. In general, each user defines a user profile and associated access rights, where the user profile and access rights are stored by or accessible to a profile service. When a voice session, or call, is initiated between a first and second user, a device of the first user requests a profile of the second user from the profile service. In response, the profile service determines whether the first user has been granted access rights to the user profile of the second user. If so, the profile service provides the user profile of the second user, or a portion thereof, to the device of the first user according to the access rights of the first user, and the user profile is presented to the first user.
    Type: Application
    Filed: July 17, 2008
    Publication date: January 21, 2010
    Applicant: DOMINGO ENTERPRISES, LLC
    Inventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings, Hugh Svendsen
  • Publication number: 20090307361
    Abstract: Systems and methods are provided for granting digital content access rights to shared content based on the existence of a voice session, such as a mobile telecommunications voice call, between users. In general, in the preferred embodiment, a voice session is established between a first user and a second user via associated devices. Either automatically upon establishment of the voice session or upon request by the first user, access rights to content shared by the first user are granted to the second user. The content shared by the first user may be content hosted by the device of the first user, another device associated with the first user, a third-party service, or the like. The access rights granted to the second user allow access to the content shared by the first user while the voice session between the first and second users is active.
    Type: Application
    Filed: June 5, 2008
    Publication date: December 10, 2009
    Applicant: Kota Enterprises, LLC
    Inventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings
  • Publication number: 20090164459
    Abstract: A system and method are provided for creating location-based user networks. In general, a proximity group including a number of users is identified. Each user in the proximity group is within a proximate area of at least one other user in the proximity group and has an area of interest. The areas of interest of the users in the proximity group are aggregated to provide an aggregate area of interest for the proximity group. Other users within the aggregate area of interest are identified as neighbors of each of the users in the proximity group. Once the neighbors are identified, each of the users in the proximity group may use the neighbors as members, or potential members, for a user network.
    Type: Application
    Filed: January 11, 2008
    Publication date: June 25, 2009
    Applicant: CONCERT TECHNOLOGY CORPORATION
    Inventors: Kenneth Jennings, Steven L. Petersen
  • Publication number: 20080091545
    Abstract: The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. The systems and methods of the invention generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. The systems and methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.
    Type: Application
    Filed: December 13, 2007
    Publication date: April 17, 2008
    Applicant: First Data Corporation
    Inventors: Kenneth Jennings, John McDonough, Peter Pridgeon, Keith Newbrough
  • Publication number: 20070198433
    Abstract: The invention provides improved security for stored-value instruments. For example, a point-of-sale device may receive a request to process a transaction (such as an activation, redemption, funds recharge, etc.) with a presentation instrument. The point-of-sale device may receive a first identifier associated with the instrument. Merely by way of example, the first identifier may be encoded on a magnetic stripe disposed on the instrument, and receiving the first identifier may comprise swiping the magnetic stripe through a reader in communication with the point-of-sale device. The point-of-sale device may also receive a second identifier associated with the instrument. In some embodiments, the first and second identifiers may be correlated, e.g., to determine whether they are consistent.
    Type: Application
    Filed: May 11, 2006
    Publication date: August 23, 2007
    Applicant: First Data Corporation
    Inventors: Christopher McGee, Keith Newbrough, Kevin Harte, Kenneth Jennings
  • Publication number: 20060255125
    Abstract: The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. The systems and methods of the invention generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. The systems and methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.
    Type: Application
    Filed: May 11, 2005
    Publication date: November 16, 2006
    Applicant: First Data Corporation
    Inventors: Kenneth Jennings, John McDonough, Peter Pridgeon, Keith Newbrough
  • Publication number: 20060259425
    Abstract: The invention provides improved security for stored-value instruments. For example, an instrument-authority system may receive a first identifier for an instrument and may thereupon authenticate the instrument, but the system may wait before activating the instrument, such that the instrument may be unusable for a period of time to allow for cancellation of activation if payment is not received for the stored-value instrument.
    Type: Application
    Filed: May 11, 2006
    Publication date: November 16, 2006
    Applicant: First Data Corporation
    Inventors: Kenneth Jennings, Keith Newbrough
  • Publication number: 20060076374
    Abstract: A hands free umbrella apparatus includes a harness comprising a shoulder strap and a chest-encircling belt. The shoulder strap is configured to overlap the user's shoulder in a generally vertical configuration. It has slots adjacent its ends for receiving the chest encircling belt. The belt is provided with an adjustable quick-disconnect buckle for securing the belt around the user's lower chest or upper abdominal region and allowing the user to adjust the length of the belt to accommodate different size individuals. An automatically deployable umbrella is secured to the front-facing external surface of the shoulder strap about midway between the belt and the top of the shoulder curve. The umbrella stem is secured to the shoulder strap by an adjustable joint having a full 180° of elevation adjustment so that the umbrella can be moved from a fully vertical upward direction to a fully vertical downward direction by rotating the stem around the joint in a vertical plane.
    Type: Application
    Filed: October 8, 2004
    Publication date: April 13, 2006
    Inventor: Kenneth Jennings