Patents by Inventor Kenneth Jennings
Kenneth Jennings has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100198828Abstract: A system and method are provided for forming crowds of users and providing access to corresponding crowd data. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. The central system forms a crowd including a number of users based on the current locations of the number of users. The central system then generates crowd data for the crowd and provides access to the crowd data for the crowd. In one embodiment, the crowd data for the crowd includes an aggregate profile for the crowd. In another embodiment, the crowd data includes data characterizing the crowd. The central system provides access to the crowd data by serving crowd data requests.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
-
Publication number: 20100198814Abstract: Systems and methods are provided for filtering and/or creating Points-of-Interest (POIs). In one embodiment, a list of POIs is obtained and then filtered based on crowd data related to the list of POIs to provide a filtered list of POIs. In another embodiment, one or more crowd-sourced POIs are created based on one or more crowds relevant to a corresponding bounding region for POI creation.Type: ApplicationFiled: January 21, 2010Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
-
Publication number: 20100198870Abstract: A system and method are provided for maintaining a historical record of anonymized user profile data for mobile device users and serving historical requests. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations and user profiles for users of mobile devices. The central system processes the current locations and the user profiles of the users over time to maintain a historical record of anonymized user profile data by location. By anonymizing the user data, privacy of the users of the mobile devices is maintained. The central system may then use the historical record of anonymized user profile data to respond to historical requests. The historical requests may be made by users of the mobile devices, subscribers, and/or third-party services.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Kenneth Jennings, Sean T. Purdy, Scott Curtis
-
Publication number: 20100198826Abstract: A system and method are provided for maintaining a historical record of anonymized user profile data for mobile device users. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations and user profiles for users of mobile devices. The central system processes the current locations and the user profiles of the users over time to maintain a historical record of anonymized user profile data by location. By anonymizing the user data, privacy of the users of the mobile devices is maintained. The central system may then use the historical record of anonymized user profile data to respond to historical requests. The historical requests may be made by users of the mobile devices, subscribers, and/or third-party services.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings, Sean T. Purdy
-
Publication number: 20100198917Abstract: A system and method are provided for forming crowds of users and providing access to corresponding crowd data. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. The central system receives a crowd request from a requesting device. In response, the central system establishes a bounding region for the request and identifies one or more crowds, each including number of users, that are relevant to the bounding region for the request. The central system then generates crowd data for the one or more crowds and returns the crowd data for the one or more crowds to the requesting device.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Scott Curtis, Kenneth Jennings
-
Publication number: 20100197318Abstract: A system and method for tracking crowds of users are provided. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices. Based on the current locations of the users, the central system forms crowds of users. As a result of movement of the users and corresponding location updates, the crowds move and change over time. In order to track at least some of the crowds, crowd snapshots for those crowds are created over time and stored. The crowd snapshots preferably maintain anonymity of the users in the crowd at the time the crowd snapshots are created. Thereafter, the crowd snapshots may be used to generate crowd tracking data for select crowds.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Steven L. Petersen, Kenneth Jennings, Sean T. Purdy
-
Publication number: 20100198862Abstract: A system and method are provided for processing a request for crowd data for a large geographic area. In one embodiment, a central system, which includes one or more servers, operates to obtain current locations for users of mobile devices and form crowds of three or more users based on the current locations of the users. In order to provide access to crowd data for crowds for a large geographic area, the central system receives a request for crowd data from a requesting device, establishes a bounding region for the request, and identifies one or more starting points within the bounding region for the request. Crowds are identified, crowd data for the crowds is generated, and the crowd data is returned to the requesting device in an iterative manner for a series of two or more outwardly radiating, concentric geographic regions centered at the one or more starting points.Type: ApplicationFiled: December 23, 2009Publication date: August 5, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Kenneth Jennings, Christopher M. Amidon, Ravi Reddy Katpelly
-
Publication number: 20100069144Abstract: A system and method are disclosed for providing location-based wagering. In one embodiment, wagerable data associated with a location of a first user is identified. The wagerable data may be any type of data on which a wager may be based. Then, a wager recommendation is generated based on the wagerable data and returned to the first user. The first user defines a wager, and the wager is published to one or more second users located in proximity to the first user. Each of the one or more second users is enabled to accept the wager if desired. In addition, one or more winners and one or more losers of the wager may be identified and payout may then be effected.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: CONCERT TECHNOLOGY CORPORATIONInventors: Scott Curtis, Kenneth Jennings, Michael W. Helpingstine, Eugene Matthew Farrelly
-
Publication number: 20100015975Abstract: A system and method are provided for sharing rights-enabled user profiles among users in voice communication system, such as a mobile telecommunications system. In general, each user defines a user profile and associated access rights, where the user profile and access rights are stored by or accessible to a profile service. When a voice session, or call, is initiated between a first and second user, a device of the first user requests a profile of the second user from the profile service. In response, the profile service determines whether the first user has been granted access rights to the user profile of the second user. If so, the profile service provides the user profile of the second user, or a portion thereof, to the device of the first user according to the access rights of the first user, and the user profile is presented to the first user.Type: ApplicationFiled: July 17, 2008Publication date: January 21, 2010Applicant: KOTA ENTERPRISES, LLCInventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings, Hugh Svendsen
-
Publication number: 20100015976Abstract: A system and method are provided for sharing rights-enabled user profiles among users in voice communication system, such as a mobile telecommunications system. In general, each user defines a user profile and associated access rights, where the user profile and access rights are stored by or accessible to a profile service. When a voice session, or call, is initiated between a first and second user, a device of the first user requests a profile of the second user from the profile service. In response, the profile service determines whether the first user has been granted access rights to the user profile of the second user. If so, the profile service provides the user profile of the second user, or a portion thereof, to the device of the first user according to the access rights of the first user, and the user profile is presented to the first user.Type: ApplicationFiled: July 17, 2008Publication date: January 21, 2010Applicant: DOMINGO ENTERPRISES, LLCInventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings, Hugh Svendsen
-
Publication number: 20090307361Abstract: Systems and methods are provided for granting digital content access rights to shared content based on the existence of a voice session, such as a mobile telecommunications voice call, between users. In general, in the preferred embodiment, a voice session is established between a first user and a second user via associated devices. Either automatically upon establishment of the voice session or upon request by the first user, access rights to content shared by the first user are granted to the second user. The content shared by the first user may be content hosted by the device of the first user, another device associated with the first user, a third-party service, or the like. The access rights granted to the second user allow access to the content shared by the first user while the voice session between the first and second users is active.Type: ApplicationFiled: June 5, 2008Publication date: December 10, 2009Applicant: Kota Enterprises, LLCInventors: Alfredo C. Issa, Richard J. Walsh, Kenneth Jennings
-
Publication number: 20090164459Abstract: A system and method are provided for creating location-based user networks. In general, a proximity group including a number of users is identified. Each user in the proximity group is within a proximate area of at least one other user in the proximity group and has an area of interest. The areas of interest of the users in the proximity group are aggregated to provide an aggregate area of interest for the proximity group. Other users within the aggregate area of interest are identified as neighbors of each of the users in the proximity group. Once the neighbors are identified, each of the users in the proximity group may use the neighbors as members, or potential members, for a user network.Type: ApplicationFiled: January 11, 2008Publication date: June 25, 2009Applicant: CONCERT TECHNOLOGY CORPORATIONInventors: Kenneth Jennings, Steven L. Petersen
-
Publication number: 20080091545Abstract: The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. The systems and methods of the invention generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. The systems and methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.Type: ApplicationFiled: December 13, 2007Publication date: April 17, 2008Applicant: First Data CorporationInventors: Kenneth Jennings, John McDonough, Peter Pridgeon, Keith Newbrough
-
Publication number: 20070198433Abstract: The invention provides improved security for stored-value instruments. For example, a point-of-sale device may receive a request to process a transaction (such as an activation, redemption, funds recharge, etc.) with a presentation instrument. The point-of-sale device may receive a first identifier associated with the instrument. Merely by way of example, the first identifier may be encoded on a magnetic stripe disposed on the instrument, and receiving the first identifier may comprise swiping the magnetic stripe through a reader in communication with the point-of-sale device. The point-of-sale device may also receive a second identifier associated with the instrument. In some embodiments, the first and second identifiers may be correlated, e.g., to determine whether they are consistent.Type: ApplicationFiled: May 11, 2006Publication date: August 23, 2007Applicant: First Data CorporationInventors: Christopher McGee, Keith Newbrough, Kevin Harte, Kenneth Jennings
-
Publication number: 20060255125Abstract: The present invention is generally directed to systems and methods for detecting unauthorized or fraudulent use of stored-value instruments. A stored-value instrument can be any instrument (tangible or intangible) that may be associated with a debit account and/or may otherwise be presented for payment for goods and/or services, used to transfer money, etc. The systems and methods of the invention generally involve processing request activity through a predetermined rule set to ascertain whether the activity is potentially unauthorized or fraudulent. The systems and methods of the invention allow for real-time monitoring of request activity for potentially unauthorized or fraudulent use of stored-value instruments.Type: ApplicationFiled: May 11, 2005Publication date: November 16, 2006Applicant: First Data CorporationInventors: Kenneth Jennings, John McDonough, Peter Pridgeon, Keith Newbrough
-
Publication number: 20060259425Abstract: The invention provides improved security for stored-value instruments. For example, an instrument-authority system may receive a first identifier for an instrument and may thereupon authenticate the instrument, but the system may wait before activating the instrument, such that the instrument may be unusable for a period of time to allow for cancellation of activation if payment is not received for the stored-value instrument.Type: ApplicationFiled: May 11, 2006Publication date: November 16, 2006Applicant: First Data CorporationInventors: Kenneth Jennings, Keith Newbrough
-
Publication number: 20060076374Abstract: A hands free umbrella apparatus includes a harness comprising a shoulder strap and a chest-encircling belt. The shoulder strap is configured to overlap the user's shoulder in a generally vertical configuration. It has slots adjacent its ends for receiving the chest encircling belt. The belt is provided with an adjustable quick-disconnect buckle for securing the belt around the user's lower chest or upper abdominal region and allowing the user to adjust the length of the belt to accommodate different size individuals. An automatically deployable umbrella is secured to the front-facing external surface of the shoulder strap about midway between the belt and the top of the shoulder curve. The umbrella stem is secured to the shoulder strap by an adjustable joint having a full 180° of elevation adjustment so that the umbrella can be moved from a fully vertical upward direction to a fully vertical downward direction by rotating the stem around the joint in a vertical plane.Type: ApplicationFiled: October 8, 2004Publication date: April 13, 2006Inventor: Kenneth Jennings