US 7,502,838 3/10/09 SYSTEM AND METHOD FOR DELIVERING REMOTELY STORED APPLICATIONS AND INFORMATION Franco; Louis M., Rose; Frank Leon, Brittan; Philip S. J., Cunningham; Mark, Bulkin; Alex, Baskin; Mat, Blonder; Greg
- A method and system to efficiently enable a lightweight client device to select and then receive the real-time output from an application server. For example, by simply clicking on a link embedded in a web page or on the desktop, receive a small snippet of code and then launch a word processing program on a server. Very fast and secure. The client/user has the impression they are running a local word processor.
5,760,771 6/2/98: SYSTEM AND METHOD FOR PROVIDING STRUCTURED TOURS OF
HYPERTEXT FILES Blonder; Greg E. and Milewski; Allen E.
are two key problems with hypertext on the internet. First, humans
are most comfortable following linear narratives with clearly (and
professionally) authored "plots". This is supported by centuries
of oral and written storytelling. Hypertext is neither linear nor
generally professionally authored, so it is ultimately a frustrating
experience. Second, the internet is so large, merely wandering around
a site leaves the visitor unsure they have encountered the most important
features. The hypertext tour agent creates a scripted, auto running
narrated set of URLs, which overlay existing sites, and reimposes
a linear narrative on the underlying loose collection of pages. Can
be used for an initial tour of a new site, or as a completely new
experience (like Mystery Theater visits the Internet).
1/13/98 TRANSACTION AUTHORIZATION AND ALERT SYSTEM Blonder; Greg E.,
Greenspan; Steven Lloyd, Mirville; J. Robert, Sugla; Binay
- Closes the loop between purchase and authorization, or login and verification. For example, at the check
out counter the register amount is sent to VISA and the bank, who
then sends you a page or text message asking to validate the transaction. By using
a two way pager or cellphone, you can authorize the transaction immediately
and confirm the right amount is debited Fewer errors in the final
bill, easy fraud detection (how can I be buying gold jewelry while
driving to work?), and better expense control. This same invention underpins "two-factor" password authorization technology.
9/24/96 METHOD FOR SENDING AND RECEIVING VIDEO IMAGES Blonder, Greg
Contact Greg Blonder by email here - Modified
Genuine Ideas, LLC.