1
William H. Gates III
Richard T Lord, Robert W Lord, Nathan P Myhrvold, Clarence T Tegreene, Roderick A Hyde, Lowell L Wood Jr, Muriel Y Ishikawa, Victoria Y H Wood, Charles Whitmer, Paramvir Bahl, Douglas C Burger, Ranveer Chandra, William H Gates III, Paul Holman, Jordin T Kare, Craig J Mundie, Tim Paek, Desney S Tan, Lin Zhong, Matthew G Dyor: Audible assistance. Elwha, Lowe Graham Jones PLLC, August 19, 2014: US08811638 (1 worldwide citation)

Techniques for sensory enhancement and augmentation are described. Some embodiments provide an audible assistance facilitator system (“AAFS”) configured to provide audible assistance to a user via a hearing device. In one embodiment, the AAFS receives data that represents an utterance of a speaker r ...


2
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Network acquired behavioral fingerprint for authentication. Elwha, October 21, 2014: US08869241 (42 worldwide citation)

A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of t ...


3
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Determining device identity using a behavioral fingerprint. Elwha, October 8, 2013: US08555077 (19 worldwide citation)

Behavioral fingerprints hold gathered data related to users' interactions with a device or devices, inter alia. Behavioral fingerprints may be used to at least partially determine a level of accessibility of the device or of an aspect of the device for the user; provide a current status of a network ...


4
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Behavioral fingerprint based authentication. Elwha, April 29, 2014: US08713704 (18 worldwide citation)

A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, t ...


5
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Trust verification schema based transaction authorization. Elwha, April 1, 2014: US08688980 (13 worldwide citation)

A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one ...


6
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Behavioral fingerprint controlled theft detection and recovery. Elwha, April 1, 2014: US08689350 (12 worldwide citation)

A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices aut ...


7
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xeudong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Behavioral fingerprinting via inferred personal relation. Elwha, March 29, 2016: US09298900 (10 worldwide citation)

Disclosed herein are example embodiments for behavioral fingerprinting via inferred personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be inferred via at least one user-device interaction, and the at least one indicat ...


8
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Behavioral fingerprinting via derived personal relation. Elwha, April 21, 2015: US09015860 (9 worldwide citation)

Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indicatio ...


9
Marc E Davis, Matthew G Dyor, William Gates, Xuedong Huang, Roderick A Hyde, Edward K Y Jung, Royce A Levien, Richard T Lord, Robert W Lord, Qi Lu, Mark A Malamud, Nathan P Myhrvold, Satya Nadella, Daniel Reed, Harry Shum, Clarence T Tegreene, Lowell L Wood Jr: Computational systems and methods for disambiguating search terms corresponding to network members. ELWHA, September 22, 2015: US09141977 (8 worldwide citation)

Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of ...


10
Marc E Davis, Matthew G Dyor, Daniel A Gerrity, Xuedong Huang, Roderick A Hyde, Royce A Levien, Richard T Lord, Robert W Lord, Mark A Malamud, Nathan P Myhrvold, Clarence T Tegreene: Behavioral fingerprint controlled automatic task determination. Elwha, May 24, 2016: US09348985 (7 worldwide citation)

A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network-accessible user, the behavioral fingerprint providing a current status of the network-accessible user; and controlling one or more devices automatically as a function ...