|| List of recent Computing Device-related patents
| System and method for patching a device through exploitation|
A system and method that includes identifying a vulnerability in a computing device; accessing a vulnerability exploitation mapped to the identified vulnerability; at the computing device, executing the vulnerability exploitation and entering an operating mode of escalated privileges; and while in the operating mode of escalated privileges, updating the system with a vulnerability resolution.. .
| Preventing propagation of hardware viruses in a computing system|
Preventing propagation of hardware viruses in a computing system, including: determining, by a hardware virus detection module, whether an empty connector in the computing system is damaged, wherein the empty connector is blocked from receiving an attachable computing device by a bumper; determining, by the hardware virus detection module, whether a connector for the attachable computing device is damaged; and responsive to determining that the empty connector is not damaged and that the connector for the attachable computing device is not damaged, moving the bumper such that the empty connector is not blocked from receiving the attachable computing device.. .
| Web ticket based upon a symmetric key usable for user authentication|
Described herein are various aspects pertaining to a web ticket that is used in connection with authenticating a user. The web ticket is generated through use of a symmetric key, and is less than two hundred bytes in size.
| Methods and systems for accessing account information electronically|
Methods and systems for accessing customer account information involve, for example, binding a computing device with a customer's profile via one or more attributes of the computing device and an encrypted token stored on the computing device and thereafter receiving an authentication request consisting at least in part of the computing device attributes and the encrypted token stored on the computing device. A determination is made as to whether or not entry of a customer credential was received within a pre-determined preceding interval of time, and predefined customer account information is displayed on the computing device without requiring entry of the customer credential when a determination is made that entry of the customer credential was received within the pre-determined preceding interval of time..
| Adaptive observation of behavioral features on a heterogeneous platform|
Methods, devices and systems for monitoring behaviors of a mobile computing device include observing in a non-master processing core a portion of a mobile device behavior that is relevant to the non-master processing core, generating a behavior signature that describes the observed portion of the mobile device behavior, and sending the generated behavior signature to a master processing core. The master processing core combines two or more behavior signatures received from the non-master processing cores to generate a global behavior vector, which may be used by an analyzer module to determine whether a distributed software application is not benign..
| Computing device and method for generating component module files of circuit diagram|
A circuit diagram includes a plurality of components. Each component corresponds to a module number and a component number.
| Systems and methods for collecting and representing attributes related to damage in a geographic area|
Methods and apparatus related to providing a damage assessment report. A geographic area potentially affected by an event may be identified.
| Method and system for displaying email messages|
A computing device and method for displaying content such as email messages in a user interface including email message cards. Email messages in an email mailbox are accessed.
| Systems, devices, or methods for accessing information employing a tumbler-style graphical user interface|
A tumbler-style graphical user interfaces (tsgui) facilitates high context rapid selection of content objects from at least a plurality of tumbler components. Selection of content objects can relate to a path for a memory to access a related final information.
| Artwork ecosystem|
A computer-implemented method performed at a computer system including one or more processors and memory storing one or more programs for execution by the one or more processors, wherein the computer system hosts a media management system. The computer system receives a selection of a media content item from a plurality of media content items stored on the computer system and an intended display device from a mobile computing device associated with a user of the media management system.
| System and method for customized graphic design and output|
The present application provides a system and method for providing a digital art platform. Data structure(s) configured for storing information associated with digital art may be provided.
| System and method for preserving critical debug data in a portable computing device|
One or more triggers may be coupled to sources on a system on a chip of a portable computing device. The sources monitor the system for status conditions.
| System and method for thermal management in a portable computing device using thermal resistance values to predict optimum power levels|
Various embodiments of methods and systems for thermal energy management in a portable computing device (“pcd”) based on power level calculations are disclosed. An exemplary method includes tracking instantaneous operating temperatures and active power supply levels to one or more components.
| System and method for managing a thermal policy of a receiving device that couples to a portable computing device|
A method and system for managing a thermal policy of a receiving device that couples to a portable computing device (pcd) includes automatically detecting a presence of the pcd. After detecting the presence of the pcd, a command to deactivate a thermal sensor and to deactivate a power supply within the pcd may be issued.
| System and method for temperature driven selection of voltage modes in a portable computing device|
Various methods and systems for minimum supply voltage level selection in a portable computing device (“pcd”) are disclosed. It is an advantage of the various embodiments that pcd designers may close timing at a certain minimum supply voltage and operating temperature threshold that is higher than the lowest end of the main operating temperature range within which the pcd must function.
| Offline file access|
In embodiments of the present invention improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in the secure database, each of the plurality of encryption keys providing access to the encrypted data file, the encrypted data file accessible as downloaded to a mobile computing device that is not connected to the network only through use of at least one of the plurality of encryption keys and presentation of a user secure identifier from a user of the mobile computing device, wherein the at least one of the plurality of encryption keys allows the user of the mobile computing device to access the encrypted data file a limited number of times.. .
| Patching boot code of read-only memory|
The present disclosure describes apparatuses and techniques for patching boot code of read-only memory (rom). In some aspects, execution of boot code from a rom is initiated to start a boot process of a device.
| Peer-to-peer network booting|
A technique for booting a computing device using a boot image that is downloaded from a distributed network booting system involves identifying a tracker computing device that manages a plurality of computing devices that store all or a portion of the boot image, receiving from the tracker computing device information about one or more computing devices from which to download the boot image, and downloading the boot image from the one or more computing devices.. .
| Method and apparatus for allocating memory for immutable data on a computing device|
A system that allocates memory for immutable data on a computing device. The system allocates a memory region on the computing device to store immutable data for an executing application.
| Computing device, memory management method, and program|
According to one embodiment, there is provided a computing device managing a first memory region and a second memory region, a power consumption to hold data stored in the second memory region being smaller than that of the first memory region, including: a data manager and a data processor. The data manager manages a referring number, which is a number of processes referring to first data existing in either one of the first memory region or the second memory region.
| Fulfillment of requests for computing capacity|
Disclosed are various embodiments relating to fulfillment of requests for computing capacity. Multiple requests for allocating computing resources for customers are obtained.
| Restlike api that supports a resilient and scalable distributed application|
An application distributed amongst plurality of computing devices leverages an application programming interface that conforms to a representational state transfer architecture in order to provide resilient services to clients and adapt to a change in availability of devices. A proxy server routes communications between clients and servers, detects when a server becomes unavailable, and reroutes communications to a replacement server.
| Optimized video streaming using cloud computing platform|
Technology is disclosed for migrating at least portions of a video streaming application to a cloud server. The migration is based on an optimization factor of a video streaming application.
| Installation of an asset from a cloud marketplace to a cloud server in a private network|
A mechanism is provided in a data processing system for deploying of an asset from a marketplace to a computing behind an enterprise firewall. A grabber service in a cloud management computing device in a private network behind the enterprise firewall monitors a placeholder in a file system of a marketplace server.
| Systems and methods for the online presentation and commerce of goods|
The invention is generally directed to systems and methods for online product presentation, and more particularly to systems and methods for the interactive live/real-time online presentation and commerce of small products. One preferred embodiment is an online computing system that enables the interactive live/real-time presentation of small products of value with intricate detail such as jewelry or precious stones on client computing devices communicatively coupled to a wide area network, such as the internet.
| Social context for applications|
In one embodiment, a method includes determining one or more applications on one or more first client computing devices of a first user of a social-networking system; determining one or more second users of the social-networking system that are connected to the first user within the social-networking system; determining one or more applications on one or more second client computing devices of the second users; comparing the applications on the first client computing devices with the applications on the second client computing devices; determining one or more application recommendations for the first user based at least in part on the comparison; and sending the application recommendations to the first user.. .
| System for registering and managing a distributed network of storage devices and method of use thereof|
A system for registering and managing a distributed network of storage devices and method of use thereof including, in general, providing a storage device with built-in proprietary operating system installed on a cpu and computer memory, plugging the storage device into a network of computers devices and other storage devices, powering the storage device via power over the network cable, communicating with a storage manager and to register with the storage manager, executing a storage device deployment plan based on existing storage devices and predefined distributed storage rules, providing a storage task of a set of storage services for a networked computer device, providing backup storage services for another storage device, communicating the storage status directly to a networked computer device, and, thus, functions as a storage system made up of many individual, identical or very similar storage devices that collectively provide storage services to multiple computing devices.. .
| Real-time communications using a restlike api|
A computing device executes a client-side instance of an application that supports bi-directional real-time synchronous communication and real-time asynchronous communication with a server computing device by way of an application programming interface (api) that conforms to representative state transfer (restlike) design principles. An eventing framework on the server computing device is used to aggregate updates to resources on the server that are requested by the client computing device, and is further used to transmit metadata to the client computing device that indicates which updates are available.
| Interaction between devices displaying application status information|
Methods and apparatus for displaying dynamic status information on a plurality of devices and enabling interactions between these devices are described. In an embodiment, a trigger signal is sent to one or more computing devices to trigger the launch of an application client on the computing device.
| Providing results to parameterless search queries|
In one implementation, a computer-implemented method includes receiving a parameterless search request, which was provided to a mobile computing device, for information that is relevant to a user of the mobile computing device. The method also includes, in response to the received parameterless search request, identifying with a digital computer system one or more results that are determined to be relevant to the user of the mobile computing device based upon a current context of the mobile computing device.
| Sampling a set of data|
In one embodiment, a method includes receiving a search query by one or more computing devices. A set of data objects to search are identified, and then an operation is executed.
| Dynamic media content|
Data associated with a user is collected from one or more remote sites. A first set of media data is received from a media content source.
| Engagement and experience based ranking|
A method, computer program product, and computer system for identifying, by one or more computing devices, online posts authored by a user. The online posts are clustered according to one or more topics of the online posts authored by the user.
| Tax document imaging and processing|
Methods, systems and articles of manufacture for allowing taxpayers to utilize mobile communication or communication devices such as smartphones and tablet devices to upload tax document images and process tax document images such that resulting recognized tax data is incorporated into an electronic tax return. Authentication data is generated and provided to the taxpayer to establishing a connection with an image processor, which provides recognized tax data to the on-line tax preparation application for incorporation into the electronic tax return.
| Method of operating a duty-free store at an airport with a product storage area and product pickup area|
The disclosure provides a method of operating a duty-free retail operation at an airport. The airport includes a secure zone and a non-secure zone, which are separated for passengers by a security checkpoint.
| Systems and methods for providing a gesture-based electronic ticket wheel|
The disclosed technology provides an electronic implementation of the functionality of a manual ticket wheel that is capable of receiving orders from a variety of sources in various formats, including point-of-sale systems, cash registers, smart phones, printers, interne requests (e.g., http requests), email, and sms messages. Users may interact with the electronic ticket wheel of the disclosed technology in the same way that they would a physical ticket wheel (e.g., rotating the wheel, pulling tickets off the wheel, etc.).
| System and method for cloud based payment intelligence|
The present application provides a system and method that includes receiving first and second electronic information associated with a first and second entity. The information is filtered and quantified and, thereafter qualified using at least one processor.
| Enterprise content management deployment, collaboration, and proposal tool|
A method executed by a processor of a computing device provides enterprise content management (ecm) solution information. A set of ecm solutions is accessed from a data storage and transmitted through a network to an organization.
| Systems and methods for continual speech recognition and detection in mobile computing devices|
The present application describes systems, articles of manufacture, and methods for continuous speech recognition for mobile computing devices. One embodiment includes determining whether a mobile computing device is receiving operating power from an external power source or a battery power source, and activating a trigger word detection subroutine in response to determining that the mobile computing device is receiving power from the external power source.
| Context based document analysis|
A method, computer program product, and computer system for identifying, by a computing device, content in a document, wherein the content includes a language expression. A context of the language expression is determined from a defined range of the content in the document.
| Time lapse marine seismic surveying employing interpolated multicomponent streamer pressure data|
In a first aspect, a method for use in a time lapse, marine seismic survey includes accessing a set of acquired, multicomponent seismic data; and interpolating a set of time lapse seismic data from the acquired seismic data. In other aspects, a program storage medium is encoded with instructions that, when executed by a computing device, perform the above method and a computing apparatus programmed to perform one or more of such methods..
| Augmented reality financial institution branch locator|
An augmented reality financial institution “fi”) branch locator uses the display screen of a mobile computing device (“mcd”) to show a customer that customer's real-world view of physical reality through the camera of the mcd on the mcd display screen (“camera image”), locations of fi branches for that customer's fi overlaid onto the camera image of the customer's physical location, locations of fi branches for competing fi's overlaid onto the same camera image, distances to the various fi branches overlaid onto the camera image, and directions to fi branches overlaid onto the camera image (together “augmented reality”) so that the user can navigate from the user's current location to a desired fi branch through the augmented reality image.. .
| Devices, systems and methods for locating and interacting with medicament delivery systems|
In some embodiments, a method includes producing, from an adapter, a first wireless signal characterized by a first communication mode with a computing device when a portion of at least one of a medicament delivery device or a simulated medicament delivery is disposed within the adapter. An indication is received when the portion of the medicament delivery device or the simulated medicament delivery device is removed from the adapter.
| Apparatuses and methods for neurological status evaluation using electromagnetic signals|
In one embodiment, a neurological status evaluation apparatus includes a signal generator configured to generate an electromagnetic signal at one or more frequencies, a transmitting antenna coupled to the signal generator and configure to transmit the electromagnetic signal, and a receiving antenna positioned proximate to the transmitting antenna such that an evaluation space is defined between the transmitting antenna and the receiving antenna. The biological tissue under evaluation does not contact the transmitting antenna or the receiving antenna.
| Optimization of gaming application execution using proxy connection|
Technology is disclosed herein for executing multiple gaming applications on a computing device. According to at least one embodiment, a computing device receives requests for network connections with remote servers from multiple gaming applications running on the computing device.
| Provisioning user attributes for use with mobile computing device|
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
| Use of wireless access point id for position determination|
A mobile computing device comprises a wireless transceiver and a processing circuit. The processing circuit is configured to identify a location, to identify a wireless access point within a predetermined distance of the location, to detect a wireless access point identifier using the wireless transceiver, to compare the detected wireless access point identifier to the identified wireless access point, and to initiate location determination based on the comparison..
| Provisioning user attributes for use with mobile computing device|
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
| Techniques for use in communications of systems for targeted datacasting|
A central server outside of a school network receives assignments from educator computing devices, where each assignment includes content for distribution to student computing devices and a schedule indicating when the assignment is active for distribution. A local server within the school network receives the assignments and stores the assignments in a local server datastore.
| Methods and systems for differentiating synthetic and non-synthetic images|
The techniques introduced here include a system and method for transcoding multimedia content based on the results of content analysis. The determination of specific transcoding parameters, used for transcoding multimedia content, can be performed by utilizing the results of content analysis of the multimedia content.
| Method and system for image processing|
Various aspects of a system and method for image processing may include a computing device having one or more processors. The computing device may be operable to determine luminance values of multiple pixels in a subset of a frame of a two-dimensional image.
| Wearable audio accessories for computing devices|
Wearable audio accessories for computing devices are described. In one embodiment the wearable audio accessory provides a speech based interface between the user and a nearby computing device for the performance of user-initiated or computing device initiated microtasks.
| Methods for analyzing network traffic and devices thereof|
A method, non-transitory computer readable medium and traffic analysis computing device for analyzing network traffic comprising sending to one or more network devices a request to capture one or more network information upon identifying a fault within a network. Next, one or more network reporting files comprising the captured one or more network information is received from each of the one or more network devices.
| Sending printjobs using trigger distances|
In one example, a printer address for a network-connected printer, a printer location, and an identifier for a mobile computing device are received. Responsive to receiving a message that is sent to the printer address and that includes a print job, the print job is stored.
| Computing device and measurement control method|
A computing device is electronically connected to a measurement machine and a controller. The controller is connected to a sensor installed on the measurement machine.
| Laser range finding attachment for mobile computing device|
The present disclosure describes methods and systems, including computer-implemented methods, computer-readable media, and computer systems, for measuring range to an object (e.g., range finding) by reflection of laser radiation. One computer-implemented method includes the following operations executed on a mobile computing device (mcd): targeting an object with the mcd display operating as a viewfinder, receiving a request to trigger a laser range finding operation, initiating triggering of an emitter on a laser range finding attachment (lrfa) coupled to the mcd, receiving range finding data from the lrfa, processing the range finding data, and initiating display of data associated with the object, the data corresponding to the processed range finding data..
| Method for measuring morpho-geometric parameters of a spectacle wearing individual|
The invention relates to a method for measuring at least one geo-morphometric parameter of an individual wearing glasses (10), said method involving a stand-alone computing device (1) comprising: a screen (8); a target (12); a compact image acquisition system (7) comprising a means for determining its inclination and connected to said screen (8); and a processing unit allowing the image acquisition system (7) to be controlled and the images obtained to be processed. The main feature of a method according to the invention is that it comprises the following steps: adjusting the inclination of the image acquisition system (7) so that it lies in an acceptable angular range; adjusting the height of the image acquisition system (7) so that the individual can see the target (12) along a substantially horizontal line of sight; observation of the target (12), by the individual, in a comfortable position subject to no positional constraints; acquiring at least one image of the eyes of the individual and of the frame (10), in said observation position; processing said at least one image using the processing unit in order to determine each geo-morphometric parameter of the individual from the position of their pupils and the inclination of their glasses (10); and returning the result of the measurements..
| Receptacle for an image capture computing device|
An apparatus comprises a receptacle configured to receive a mobile computing device that has an integrated image capture component. Further, the apparatus comprises a plurality of handles such that each handle is operably connected to the receptacle.
| Providing multiple data transmissions|
Methods and systems related to processing multiple data transmissions are disclosed. For example, a computing device may receive a data stream corresponding to a content item, and generate additional data streams by sampling the data stream, for example, using different sampling regions.
| Input tools having viobro-acoustically distinct regions and computing device for use with the same|
An input tool includes a body in the form of a stylus with plurality of vibro-acoustically distinct regions. The vibro-acoustically distinct regions produce vibro-acoustic responses when the regions touch the surface of the touch screen.
| Systems and methods for identifying a user of an electronic device|
Systems and methods for identifying a user of an electronic device are disclosed. An example method includes capturing body characteristic data associated with a user via a sensor on a computing device.
| System and method for tuning a thermal strategy in a portable computing device based on location|
Various embodiments of methods and systems for tuning a thermal strategy of a portable computing device (“pcd”) based on pcd location information. In an exemplary embodiment, it may be recognized that the pcd is in an active state and producing thermal energy, or that one or more thermally aggressive components of the pcd are operating near temperature thresholds for efficient operation.