Hadley Stern

Greater Boston Contact Info
10K followers 500+ connections

Join to view profile

About

Hadley Stern is a pioneering leader in digital asset custody and blockchain innovation…

Articles by Hadley

See all articles

Activity

Join now to see all activity

Experience & Education

  • MPCH

View Hadley’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

  • Citizen Schools Graphic

    Volunteer Teacher

    Citizen Schools

    - Present 11 years 8 months

    Children

    Co-taught a Citizen's School Class on Mobile App Development

  • CARING CANINES THERAPY DOGS INC Graphic

    Volunteer

    CARING CANINES THERAPY DOGS INC

    - 1 year 4 months

    Social Services

    With our wonderful Beagle, Marge, volunteer at seniors homes and other facilities to provide comfort to patients and residents.

Patents

  • Alert notification based on field of view

    Issued 10133931

    Techniques for collecting and presenting information using a wearable device involve receiving criteria information data that specifies one or more criteria for providing information to a user of a wearable device; receiving information indicative of a field of view of the user of the wearable device; detecting that an object in the field of view is associated with one or more attributes that satisfy the user-specified criteria; responsive to detection, executing a rule associated with one or…

    Techniques for collecting and presenting information using a wearable device involve receiving criteria information data that specifies one or more criteria for providing information to a user of a wearable device; receiving information indicative of a field of view of the user of the wearable device; detecting that an object in the field of view is associated with one or more attributes that satisfy the user-specified criteria; responsive to detection, executing a rule associated with one or more attributes that satisfy the user-specified criteria; and based on execution of the rule, causing an informational depiction to be presented via a display of the wearable device that visually eliminates or enhances the detected object in the field of view of the user.

  • Authentication using a video signature

    Issued US 8941741

    Methods and apparatuses, including computer program products, are described for authentication using a video signature. A computing device receives a request to access a secure resource, and the request includes a first video segment comprising a plurality of visual and audio elements. The computing device analyzes one or more of the plurality of visual and audio elements in the first video segment to determine a value associated with each of the one or more analyzed elements. The computing…

    Methods and apparatuses, including computer program products, are described for authentication using a video signature. A computing device receives a request to access a secure resource, and the request includes a first video segment comprising a plurality of visual and audio elements. The computing device analyzes one or more of the plurality of visual and audio elements in the first video segment to determine a value associated with each of the one or more analyzed elements. The computing device calculates a total score for the first video segment based upon the value associated with each of the one or more analyzed elements. The computing device compares the total score for the first video segment to a score associated with a second video segment associated with the computing device. The computing device determines whether access to the secure resource is permitted based upon the comparison step.

    Other inventors
  • Secure video conferencing to conduct financial transactions

    Issued US 8943568

    Methods and apparatuses, including computer program products, are described for secure video conferencing to conduct financial transactions. A server computing device receives a request to establish a video conference from a first client device associated with a user of the first client device. The server computing device authenticates the first client device using credential information. The server computing device establishes a video conference between the first client device and a second…

    Methods and apparatuses, including computer program products, are described for secure video conferencing to conduct financial transactions. A server computing device receives a request to establish a video conference from a first client device associated with a user of the first client device. The server computing device authenticates the first client device using credential information. The server computing device establishes a video conference between the first client device and a second client device associated with a customer representative of a financial institution. The server computing device transmits video images associated with one or more cameras coupled to the first client device to the second client device, the video images comprising a view of the user and an area surrounding the user. The server computing device determines whether any persons other than the user are present in the area surrounding the user.

    Other inventors
  • Methods and systems for expedited trading account funding

    Issued US 20140379544

    A computer-implemented method is provided for opening an expedited account for a user. The method includes receiving a request from the user to make a trade associated with at least one financial instrument, in the absence of an account being opened for the user. The method includes determining a plurality of factors in response to the request, the plurality of factors including 1) a credit worthiness score of the user; 2) a source of capital identified by the user to cover the trade; and 3) a…

    A computer-implemented method is provided for opening an expedited account for a user. The method includes receiving a request from the user to make a trade associated with at least one financial instrument, in the absence of an account being opened for the user. The method includes determining a plurality of factors in response to the request, the plurality of factors including 1) a credit worthiness score of the user; 2) a source of capital identified by the user to cover the trade; and 3) a type of the at least one financial instrument associated with the trade. The method also includes opening the expedited account for the user with limited trading privileges, in which an amount of fund for trading is advanced to the user based on the plurality of factors. The method further includes allowing the user to make a trade up to the amount of fund advanced.

    Other inventors
  • Generating and Tracking Activity Patterns for Mobile Devices

    Filed US 20110022312

    Described are methods and apparatuses, including computer program products, for tracking patterns associated with mobile devices. The system includes a server computing device configured to receive location information from a mobile device associated with a user. The location information includes location information based on GPS information sent from the mobile device. One or more activity patterns associated with the user of the mobile device are generated by the server computing device. The…

    Described are methods and apparatuses, including computer program products, for tracking patterns associated with mobile devices. The system includes a server computing device configured to receive location information from a mobile device associated with a user. The location information includes location information based on GPS information sent from the mobile device. One or more activity patterns associated with the user of the mobile device are generated by the server computing device. The generating includes tracking the location information over a period of time and determining one or more categories of repeated activity based on the tracking.

    Other inventors
  • Location-Based Address Determination and Real Estate Valuation

    Filed US 20110022540

    Described are methods and apparatuses, including computer program products, for location-based address determination and real estate valuation. Current location information from a mobile device is received by a server computing device. The location information includes global positioning data associated with the mobile device and photographic data associated with one or more photos taken by the mobile device and associated with the location. A street address based on the location information is…

    Described are methods and apparatuses, including computer program products, for location-based address determination and real estate valuation. Current location information from a mobile device is received by a server computing device. The location information includes global positioning data associated with the mobile device and photographic data associated with one or more photos taken by the mobile device and associated with the location. A street address based on the location information is determined by the server computing device. The photographic data is processed in associated with the global positioning data, wherein the photographic data is used to determine the street address. Financial data associated with the street address is received.

    Other inventors
  • Inserting Personalized Information into Digital Content

    Filed US 20110023063

    Products for inserting personalized information into digital content. A request for digital video content is received by a computing device. The request includes authentication data associated with a user of a client device. Personalized data to be inserted into the requested video content is generated by the computing device. The personalized data and the requested video content are combined by the computing device. The combining includes replacing one or more frames of the requested video…

    Products for inserting personalized information into digital content. A request for digital video content is received by a computing device. The request includes authentication data associated with a user of a client device. Personalized data to be inserted into the requested video content is generated by the computing device. The personalized data and the requested video content are combined by the computing device. The combining includes replacing one or more frames of the requested video content with the personalized data to generate personalized video content.

    Other inventors
  • Communication Session Transfer Between Devices

    US 20130318249

    Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first computing device detects the presence of a second computing device in proximity to the first computing device, where the first computing device has established a first communication session with a remote computing device. The first computing device establishes a wireless connection to the second computing device. The first computing…

    Methods and apparatuses, including computer program products, are described for communication session transfer between a plurality of computing devices. A first computing device detects the presence of a second computing device in proximity to the first computing device, where the first computing device has established a first communication session with a remote computing device. The first computing device establishes a wireless connection to the second computing device. The first computing device receives, from the second computing device, information associated with the first communication session. The first computing device establishes a second communication session with the remote computing device using the received information, where the second communication session is established with the same state as the first communication session.

  • Risk adjusted, multifactor authentication

    US 8,584,219

    A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource;…

    A computer-implemented method comprising: receiving, from a device used by a user, a request to access a resource hosted by a computer system; identifying, by the computer system, a level of risk associated with the user requesting access to the resource; adjusting, by the computer system an authentication standard for access to the resource, adjusting based on the identified level of risk; determining values for authentication factors used in authenticating the user's access to the resource; applying weights to the values for the authentication factors; and determining, based on a comparison of the weighted values to the adjusted authentication standard, whether the user is authorized to access the resource.

    Other inventors

Projects

  • Select Speeches & Presentations

    -

    • HUBweek / Federal Reserve Bank of Boston | “The Hype and Promise of Blockchain” – Boston, MA (2016)
    • Consensus 2016 Conference | Blockchain Hackathon Judge – New York, NY (2016)
    • InformationWeek IT Leadership Summit | “Emerging Technology in Financial Services”– New York, NY (2014)
    • Innovation Models In Digital Banking & Financial Services Conference | “Wearable Computing Innovation in Financial Services” – Boston, MA (2013)
    • ABA, Wealth Management Conference | “Social Media…

    • HUBweek / Federal Reserve Bank of Boston | “The Hype and Promise of Blockchain” – Boston, MA (2016)
    • Consensus 2016 Conference | Blockchain Hackathon Judge – New York, NY (2016)
    • InformationWeek IT Leadership Summit | “Emerging Technology in Financial Services”– New York, NY (2014)
    • Innovation Models In Digital Banking & Financial Services Conference | “Wearable Computing Innovation in Financial Services” – Boston, MA (2013)
    • ABA, Wealth Management Conference | “Social Media for Banking Industry”– Miami, FL (2011)
    • T3 Conference | “Social Media 101” – San Diego, CA (2010)
    • 140 Character Conference | Social Media Panelist – New York, NY (2009

Honors & Awards

  • Fidelity Global Leadership Program, Selected by Management

    Fidelity Investments

  • Excellence Award, Fidelity Customer and Marketing

    Fidelity Investments

  • Fidelity Ad Agency Achievement Award

    Fidelity Investments

More activity by Hadley

View Hadley’s full profile

  • See who you know in common
  • Get introduced
  • Contact Hadley directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More