|| List of recent Computing Device-related patents
|Systems and methods for testing and managing defensive network devices|
The field of the invention relates to systems and methods for securing networked computing devices, and more particularly to systems and methods for testing and managing defensive network systems. In a preferred embodiment, a defensive network management subsystem is included.
|Method, client and server of password verification, and password terminal system|
The present disclosure provides techniques for authenticating a password. These techniques may enable a user terminal to retrieve a diagram using a computing device.
|Secure identification of computing device and secure identification methods|
A method implemented on a computing device provides for identifying the device and/or a user to an application on the device. The method comprises receiving a function call for a public identifier, responding to the function call, performing a hash operation and returning the public identifier.
|Configuring initial settings of a network security device via a hand-held computing device|
Process, equipment, and computer program product code for configuring a network security device using a hand-held computing device are provided. Default initial settings for a network security device are received by a mobile application running on a hand-held computing device.
|Mobile application deployment for distributed computing environments|
Embodiments of the present invention provide a method, system, and computer program product for ensuring the veracity of a mobile application for deployment in a distributed computing environment. In an embodiment of the invention, a method for ensuring the veracity of a mobile application for deployment in a distributed computing environment is provided.
|Denoising touch gesture input|
In one embodiment, a computing device determines a touch gesture on a touch screen of the computing device. The touch gesture includes two or more data points that each correspond to a particular location on the touch screen and a particular point in time.
|User interfaces for head-mountable devices|
Methods, apparatus, and computer-readable media are described herein related to a user interface (ui) for a head-mountable device (hmd). A computing device, such as an hmd, can display at least a portion of a first linear arrangement of cards.
|Incremental feature-based gesture-keyboard decoding|
In one example, a method includes outputting, at a presence-sensitive display operatively coupled to a computing device, a graphical keyboard comprising a plurality of keys and receiving an indication of a gesture to select a group of keys of the plurality of keys. The method may further include determining, in response to the indication, a candidate word based at least in part on the group of keys.
|Arced or slanted soft input panels|
A soft input panel (sip) for a computing device is configured to be used by a person holding a computing device with one hand. For example, a user grips a mobile computing device with his right hand at the bottom right corner and uses his right thumb to touch the various keys of the sip, or grips a mobile computing device with his left hand at the bottom left corner and uses his left thumb to touch the various keys of the sip.
|Grouping of cards by time periods and content types|
Methods, apparatus, and computer-readable media are described herein related to a user interface (ui) for a computing device, such as head-mountable device (hmd). The ui allows a user of the hmd to navigate through a timeline of ordered screens or cards shown on the graphic display of the hmd.
|Triggering a refresh of displayed content on a mobile device|
The present disclosure involves methods, systems, and devices, including computer programs encoded on a computer storage medium, for providing a generic refresh of displayed content on computing devices, e.g., handheld devices. In one aspect, a method comprises displaying on a screen of the device a content area and a tab area comprising at least one tab.
Stylus settings techniques are described. In implementations, an input is recognized as selecting at least one object displayed in a user interface by a display device of a computing device.
|Capturing and sharing visual content via an application|
Systems and method for capturing content for sharing are disclosed. In some aspects, a content capturing application is instantiated on a first computing device.
|Media insertion interface|
A computing device may output a graphical user interface for display at a presence-sensitive screen including an edit region and a graphical keyboard. The computing device may receive an indication of a gesture detected at a location of the presence-sensitive screen within the graphical keyboard.
|Provision of haptic feedback for localization and data input|
Various technologies pertaining to provision of haptic feedback to users of computing devices with touch-sensitive displays are described. First haptic feedback is provided to assist a user in localizing a finger or thumb relative to a graphical object displayed on a touch-sensitive display, where no input data is provided to an application corresponding to the graphical object.
|Methods and systems for optimizing information technology costs based on outage costs|
A method that includes monitoring, by a computing device including a processor, transaction activity level of a plurality of pre-defined it transactions, and determining, by the computing device, that an it outage has occurred when the activity level is below a threshold.. .
|Processor clocking policies for mobile computing devices|
In one embodiment, a processor of a computing device executes a sequence of instructions that depends on one or more external operations. Software of the computing device determines a clocking policy for the processor during execution of the sequence of instructions.
|Battery management system and method|
A battery management system/method implementing optimal dynamic battery charge/discharge cycling is disclosed. The system utilizes a power source control unit (pscu) to selectively switch a power supply source to a battery charger that charges a battery servicing a portable computing device.
|Adaptive screen timeouts based on user preferences, interaction patterns and active applications|
A computing device, such as a mobile communication device, is provided that adjusts, based on user interaction with the device, sleep times for a display to enter a sleep mode restricting use of a graphical user interface. The device includes a display providing the graphical user interface and a processor.
|Secure credential unlock using trusted execution environments|
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, personal identification number (pin), password, etc. Has been forgotten or is unknown.
|Client side encryption with recovery method|
Technology is disclosed herein for client side data encryption with a recovery mechanism. According to at least one embodiment, a computing device encrypts at least one data set into an encrypted data set using a private encryption key.
|Secure client-side key storage for web applications|
Implementations of the present disclosure include methods, systems, and computer-readable storage mediums for secure client-side key storage for authentication tracking. Implementations include actions of determining, at a browser executed on a client-side computing device, that an application is authentic, the application being executed on a server-side computing device, in response to determining that the application is authentic, receiving a session signing key (ssk) at a sub-domain of an application domain, the sub-domain including a static script that handles the ssk and that selectively provides request signatures, receiving, at the sub-domain, a message requesting a request signature, determining that the message originated from an authentic origin, and in response to determining that the message originated from an authentic origin, providing a request signature to a source of the message, the request signature being based on the ssk..
|Managing operating system components|
A plurality of operating system (os) components is stored in a storage location on a computing device. A user may selected a set of os components to use when the computing device boots.
|Remote redundant array of inexpensive memory|
A method for retrieving stored information from a storage node includes operating a computing device to generate a memory access request comprising a virtual memory address that identifies a first storage node and at least a second storage node based on the virtual memory address. The method further includes operating the computing device to transmit a retrieve request to both the first storage node and the second storage node to retrieve stored information.
|Remotely controllable electrical sockets with plugged appliance detection and identification|
Embodiments of the present invention provide for a remotely controllable electrical socket. Such sockets may include an electrical conductor for receiving a plug of an electrical device.
|Dynamic selection of operating modes|
A dock connects to a user's host device and provides video output to a display. The host device is a computing device that executes one or more applications.
|Method and system for access point congestion detection and reduction|
A method and system for detecting and reducing data transfer congestion in a wireless access point includes determining a round-trip-time value for an internet control message protocol (icmp) packet transmitted from a source computing device to a first computing device of a plurality of computing devices via the wireless access point. A data rate for data transmissions from the source computing device is increased to a value no greater than a peak data rate value if the round-trip-time is less than a first threshold value.
|System and method for customization of web content|
The present invention provides a method and system for customizing web content for a mobile computing device associated with a user over a network. The method and system include receiving a request for web content from the mobile computing device associated with the user and parsing acquired web content into separate one or more component parts based on the received request.
|Remote control of medical devices using instant messaging infrastructure|
Systems and methods for remote control and management of medical workstations using an instant messaging infrastructure. A remote client, such as a mobile phone, laptop, tablet, or other computing device, is used to generate instructions or information requests in one or more data packets.
|Forwarding messages for meeting attendees to host computers at the meeting location|
A method and apparatus for managing messages is disclosed. A data processing system identifies a presence of a person in a meeting at a location using calendar information.
|In-line images in messages|
In one embodiment, a computing device detects an identifier of an object entered by a user participating in a message session. The message session includes one or more messages including text, and the text includes the identifier.
|Location based social networking system and method|
A method, computer program product, and computer system for receiving, at a first computing device, location information of a second computing device and one or more computing devices. The location information is received in response to an action performed with at least one of the first computing device and the one or more computing devices.
|Mobile application migration to cloud computing platform|
Technology is disclosed herein for migrating at least portions of computer applications to a server. According to at least one embodiment, a computing device identifies a service component of a computer application executed at the computing device.
|Resilient data node for improving distributed data management and bandwidth utilization|
The present document is directed to data backup and data archiving and data synching and data sharing over disparate networks for the purpose of allowing private and commercial computing device users to back up, archive, synchronize and share data, including data files, on remote data-storage facilities via a network-based application. In particular, the teachings of the present document facilitate the end to end process through the utilization of a resilient data node without compromising the system itself, or the data stored therein security or privacy..
|Cloud-based skip tracing application|
A method executed at least in part in a computing device for providing cloud based skip tracing is provided. The method includes providing a cloud based service enabling data interchange with a plurality of vendors providing skip tracing services and receiving at the cloud based service and from a user a file of records for skip tracing.
|Creation of inverted index system, and data processing method and apparatus|
The present disclosure relate to techniques for establishing an inverted indexing system and related data processing. The techniques may include writing, by a computing device, inverted indexes of a massive amount of data records into at least one inverted file.
|Computer implemented methods and apparatus to interact with records using a publisher of an information feed of an online social network|
Disclosed are methods, apparatus, systems, and computer-readable storage media for interacting with records using a publisher configured to publish information to a feed of a social network. In some implementations, a computing device receives a request to interact with a child record related to a parent record stored in a database system.
|Custom event and attraction suggestions|
A computing device may determine a geographic location of the computing device. The computing device may receive information associated with a user.
|Data synchronization based on file system activities|
Technology is disclosed herein for data synchronization based on file system activities. According to at least one embodiment, a computing device monitors one or more file system operations for a file stored in the computing device.
|Relaxed anchor validation in a distributed synchronization environment|
Relaxing of anchor validation in a distributed synchronization environment, in one aspect, updates a synchronization anchor during synchronization of data between computing devices only in response to determining that the data operation if repeated the second time on the computing device would change overall data stored on the computing device.. .
|Apparatus and method for collecting and manipulating transaction data|
Described herein are apparatus and methods for collecting and manipulating transaction data. For example, presented herein is an apparatus including: a first i/o port; a second i/o port of a same type as the first i/o port, wherein the second i/o port is connected to the first i/o port such that data passed into the first i/o port is allowed to pass through the apparatus to the second i/o port unimpeded in at least a first operating mode; a processor; and a non-transitory computer readable medium storing instructions thereon wherein the instructions, when executed, cause the processor to: collect information passed from a first computing device connected to the first i/o port to a second computing device connected to the second i/o port, identify, from the information, transaction data; and provide, to a third computing device, the transaction data..
|Systems and methods for device and meter monitoring|
The invention disclosed herein overcomes obstacles in providing connectivity to personal medical meters and mobile computing devices. Systems, methods, and devices of the invention allow subjects to connect personal medical monitors/meters to the cloud through mobile computing devices.
|Method for displaying linked family health history on a computing device|
A method for displaying a family health history on a computing device is described. The method includes obtaining a first medical record profile.
|System for contextual marketing in healthcare|
A system is provided to enable interactive in-context marketing during an encounter in healthcare at a touch-point or a plurality of patient touch-points. The system consists of a network of multiple channels for touch-points including one or more kiosks or one or more mobile devices or one or more computing devices or one or more display devices.
|Method and apparatus for matching tools based on time trace data|
A method includes receiving tool trace data from a group of tools of the same type in a computing device. A tool fingerprint is generated for each tool using the tool trace data for the tools in group other than the tool for which the tool fingerprint is generated in the computing device.
|Managing game metrics and authorizations|
Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gaming environment.
|System, method, and device for intelligence gathering and position tracking|
A mobile communication device that may be used by an investigator to secretly record a suspect and track the investigator's location includes a microphone for detecting sounds, a communication component for transmitting signals or data representative of the sounds to one of the portable computers via the wireless communication network, a display for displaying information related to operation of the device, a computing device, and a computer program implemented by the computing device. The computer program is operable to place the device in a stealth mode in which the display is turned off or otherwise deactivated to make the entire device appear to be turned off while the microphone continues to detect sounds and the communication component continues to transmit signals or data representative of the sounds to a surveillance or support team operating one of the portable computers.
|Proximity-based, temporally-limited one-to-many and one-to-one hyperlocal messaging of location- and semantically-aware content objects between internet-enabled devices|
System and method for enabling proximity-based, temporally-limited broadcasting (one-to-many) and direct (one-to-one) hyperlocal messaging of semantically-aware content for both fixed and mobile internet-enabled, location-aware computing devices in which internet-enabled devices are able to send broadcasts or individually directed messages containing semantically aware content and where the messages are able to be received only by users of the same system within a certain proximate temporal and spatial area to the sending device. By means of assigning each content object a valid reception area and an associated time validity the platform enforces that the combination of the temporal and spatial area variables results in a hyperlocal messaging thus any particular content has the property that it can only be seen within a certain hyperlocal area.
|Patient simulation system for medical services or diagnostic machines|
A system, method, and apparatus for a patient simulator that interacts with a diagnostic or therapeutic medical device. The system includes a computing device coupled to a patient module.
|Method for delivering behavior change directives to a user|
One variation of a method for prompting behavior change includes: receiving a first set of user activity data collected on a wearable device and on a mobile computing device during a first time period; identifying a habit within the first time period based on the first set of user activity data; assigning a classification to the habit; receiving a second set of user activity data collected on the wearable device during a second time period; based on the second set of user activity data, determining a deviation from the habit during the second time period; and generating a behavior change prompt to modify the habit based on the classification of the habit and the deviation from the habit that exceeds a threshold deviation.. .
A system including a data storage device connected to a server. The device stores identifiers associated with sounds in a selected language.
|Method and system for creating digital image album|
The disclosed embodiments related to a method and system for creating a digital image album implementable on a computing device. The method includes grouping a plurality of digital images to generate a plurality of groups.
|System and method for client interaction application integration|
A system for integration of client interaction technologies, comprising a plurality of resource managers, each comprising at least a software component operating and stored on a computing device; a plurality of resources, each comprising at least an interactive element; a monitoring service, comprising at least a software service operating and stored on a computing device; and a callback cloud, comprising at least a plurality of contact agents; wherein the monitoring service tracks resource status; further wherein upon receiving an interaction request the resource managers handle the request according to known resource information; and further wherein the callback cloud responds to at least a plurality of received interaction requests.. .
|Apparatus and method for wireless mesh network communications|
A portable apparatus for use in a wireless mesh network includes a radio configured to transmit and receive signals to one or more network nodes coupled to a machine. The portable apparatus also includes a communication interface coupled to the radio, the communication interface being configured to be coupled to a computing device comprising a processor coupled to an input interface..
|Active cooling dock for computing device|
Various computing devices and methods of thermally managing the same are disclosed. In one aspect, a method of providing air to an interior of a computing device is provided.
|Stabilization and easy repositioning of a display|
Techniques applied to a computing device having a display, a base, and components that allow repositioning of the display relative to the base are provided, which can be used for stabilizing and changing the position of the display relative to the base. A determination is made via a processor as to when the display is changing position relative to the base.
|Deblurring images according to a user's eyesight|
In one embodiment, a method includes a computing device accessing a deconvolution function for a point spread function describing at least part of a user's eyesight. The computing device applies the deconvolution function to an image to be displayed on a display to the user.
|One-dimensional to two-dimensional list navigation|
Methods, apparatus, and computer-readable media are described herein related to a user interface (ui) for a computing device, such as a head-mountable device (hmd). The computing device can display a first card of an ordered plurality of cards using a timeline display.
|High-performance closed-form single-scan calculation of oblong-shape rotation angles from optical image data of arbitrary size and location for user interface applications|
A method and system for calculating oblong-shape rotation angles from optical image data of arbitrary size for user interface applications is described without the need of eigenvector routines and storage of the image data. The oblong shape may be of arbitrary size and location and need not be precisely elliptical.
|Mobile computing device for fleet telematics|
A mobile computing device for fleet telematics including a display and a controller configured to present at least one telematics application to a user. In an exemplary embodiment, the application is a verified inspection application, and the device includes an rf coil for an rfid reader that substantially extends along a perimeter of a housing for the device.
|Multi-function configurable haptic device|
Technologies relating to touch-sensitive displays are described herein. A computing device with a touch-sensitive display is configurable to act as multiple control devices, such as a video game controller, a remote control, and music player.
|Split virtual keyboard on a mobile computing device|
Described herein is a split virtual keyboard that is displayed on a tablet (slate) computing device. The split virtual keyboard includes a first portion and a second portion, the first portion being separated from the second portion.
|Incremental multi-touch gesture recognition|
In one example, a method comprises outputting, by a computing device and for display at an output device, a graphical keyboard comprising a plurality of keys, and receiving, by the computing device, an indication of a multi-touch gesture detected at a presence-sensitive display, the multi-touch gesture comprising a first sub-gesture that traverses a first group of keys of the plurality of keys and a second sub-gesture that traverses a second group of keys of the plurality of keys. This example method further comprises determining, in response to detecting the first sub-gesture and the second sub-gesture, a candidate word based at least in part on the first and second groups of keys, and outputting, by the computing device and for display at the output device, the candidate word..
|Wearable sensor for tracking articulated body-parts|
A wearable sensor for tracking articulated body parts is described such as a wrist-worn device which enables 3d tracking of fingers and optionally also the arm and hand without the need to wear a glove or markers on the hand. In an embodiment a camera captures images of an articulated part of a body of a wearer of the device and an articulated model of the body part is tracked in real time to enable gesture-based control of a separate computing device such as a smart phone, laptop computer or other computing device.
|Smart window and display enclosure|
A computing device includes a display enclosure. The display enclosure can include a smart window.