This page is updated frequently with new Mobile Computing Device-related patent applications.
|| List of recent Mobile Computing Device-related patents
|System and method to enable rules-restricted vending machine purchases|
A method and system that allows a self-standing vending machine to distribute controlled goods only to authorized purchasers wherein the authorization and purchase occurs via the purchaser's mobile computing device. The invention allows the purchaser to locate products, get information about products, and purchase products using their mobile phone and receive those products at a specified vending machine.
Captech Ventures, Inc.
|Method for providing privacy through atm communication to consumer devices|
Disclosed is an automated teller machine (atm) that directly communicates with consumer devices to provide privacy. The atm typically includes a processor, a memory, and a module stored in the memory.
Bank Of America Corporation
|Methods and systems for filtering communication between peripheral devices and mobile computing devices|
The embodiments are directed to methods and systems for sending and receiving signals between one or more peripheral devices connected to a dongle system and an operating system. The methods and systems can detect when a dongle system has been connected to a mobile computing device.
Citrix Systems, Inc.
|System and printing from a mobile computing device to a narrow media printer|
One aspect of the disclosure relates to a method for printing a document in a mobile environment, comprising: using a mobile computing device, executing a first application in the background; executing a second application in the foreground; activating, from the second program, an extension of the first application; wherein the extension facilitates conversion of a selected document having a first encoding to a second encoding, the second encoding useable to control a printer communicatively coupled to the mobile computing device via a wifi, bluetooth, or wired connection. The printer can be a narrow media printer, wherein, responsive to receipt of the second encoding, the narrow media printer prints the document.
|Real-time event monitoring system for basketball-related activities|
An event monitoring system for tracking, tabulating and displaying in real-time player and team performance statistics and events (such as scores, shot percentages, ball possessions, steals, rebounds and turnovers) during a basketball game or basketball-related activity involving a basketball goal, a plurality of players, and a basketball equipped with active or passive rfid tags. The system includes a plurality of wireless ball trackers worn on the wrists of participating players and officials, or attached to the goals, and a wireless mobile computing device with an event monitoring program and a set of data objects configured to store data representing current and historical events and performance statistics associated with the basketball activity and participants.
|Body presence sensor calibration|
Technologies for the calibration of a body presence sensor include a mobile computing device configured to calibrate the body presence sensor based on a present physical configuration mode of the mobile computing device. The mobile computing device may be adjustable into multiple physical configuration modes based on the intended use of the mobile computing device.
|Methods and systems for managing resources on a mobile trading device|
Certain embodiments provide a method including obtaining data at a first time using at least one sensor associated with a mobile computing device, the at least one sensor arranged to gather data regarding at least one operating factor for the mobile computing device, the mobile computing device configured to receive market data and execute a trading application. The example method includes analyzing the data obtained from the at least one sensor to determine the at least one operating factor.
Trading Technologies International Inc.
|Context-based management of wearable computing devices|
Technologies for context-based management of wearable computing devices include a mobile computing device and a wearable computing device. The wearable computing device generates sensor data indicative of a location context of the wearable computing device and transmits the sensor data to the mobile computing device.
|Systems and methods for presenting traveler interfaces on displays of mobile computing devices|
In some embodiments, systems and methods for presenting a traveler interface using a mobile computing device are provided. In some embodiments, aspects of the traveler interface are hidden to allow the traveler interface to be presented on the display of the mobile computing device.
|System, devices, and methods for providing a product recall notice to a consumer|
Systems, devices, and methods for providing a product recall notice to a consumer are disclosed. Embodiments include receiving consumer identification information and product identification information from a mobile computing device at a computer server as well as storing and associating the product identification information in a consumer products database with the consumer identification information.
Mobile job posting
A mobile computing device displays details of a job that is posted on a social networking service as an unpaid job posting together with an option for upgrading the unpaid job posting to a paid job posting with associated advantages in comparison to the unpaid job posting. The mobile computing device displays a fee for the upgrade and at least one of the associated advantages of the paid job posting.
Natural motion-based control via wearable and mobile devices
A “natural motion controller” identifies various motions of one or more parts of a user's body to interact with electronic devices, thereby enabling various natural user interface (nui) scenarios. The natural motion controller constructs composite motion recognition windows by concatenating an adjustable number of sequential periods of inertial sensor data received from a plurality of separate sets of inertial sensors.
Computing device bonding assemblies
The description relates to computing devices, such as mobile computing devices. One example can include a first portion, a second portion, and an adhesive.
Docking apparatus and systems for mobile computing devices
Disclosures are presented for systems and apparatus for docking a mobile computing device for display and for coupling it with a cable for purposes of charging and/or syncing. Such teachings may allow a user to reel the cable around a spool, couple the mobile computing device with the cable, decouple the mobile computing device, and/or swivel the mobile computer in its stand with relative ease, such as with a single hand, through the use of micro-suction cups.
Quell & Company, Llc
Location based haptic direction finding
Methods and apparatus relating to location-based haptic direction finding are described. In an embodiment, logic (e.g., included in a mobile computing device) redirects one or more navigational hints to one or more trembler devices instead of a display device and/or speakers of the mobile computing device in response to a request to provide haptic directional cues.
Mobile ballistics processing and targeting display system
A mobile ballistics processing and targeting display system for receiving data associated with one or more ballistics variables, for processing such variables, and for displaying an intuitive targeting solution. One or more ballistics variables are inputted into a mobile computing device or are otherwise acquired by such device.
Hypertension prevention app and web based tools
A computer system and method is disclosed as a support structure for patients with hypertension or prehypertension to encourage life style changes leading to dietary control, increase exercise and blood pressure control. The method includes automated messages and responses delivered in real time to encourage appropriate actions by the patient.
Methods and controlling lighting based on user manipulation of a mobile computing device
Disclosed are methods and apparatus for lighting control. One or more properties of light output are controlled based on user manipulation of a mobile computing device (110, 510) such as a mobile phone.
Koninklijke Philips N.v.
Regulation via geofence boundary segment crossings
Embodiments related to regulating access to content via geofence boundary segment crossings are disclosed herein. For example, in some embodiments, a computing system for regulating access to content may include: boundary segment crossing logic to determine whether a mobile computing device satisfies boundary segment crossing criteria, wherein the boundary segment crossing criteria includes that the mobile computing device crossed a predetermined segment of a geofence boundary into an area defined by the geofence boundary; and/or content access logic, coupled to the boundary segment crossing logic, to, in response to a determination by the boundary segment crossing logic that the mobile computing device satisfied the boundary segment crossing criteria, provide a content identifier, associated with the predetermined segment of the geofence boundary, to the mobile computing device.
Sharing location information during a communication session
In one embodiment, a method includes receiving a request to provide location information associated with a first user. The location of the first user is determined, and the location of the first user is communicated to a second user, the location of the first user being displayed on a graphical user interface of a mobile computing device associated with the second user..
System and location-based security
A mobile computing device, including: a first memory device having first computer-readable instructions tangibly recorded thereon; a first hardware processor configured to execute the first computer-readable instructions recorded on the first memory device; and an rfid component that includes a transceiver configured to receive a proximity signal from at least one rfid reader when the rfid component is within a predetermined range of the at least one rfid reader, and a second memory device configured to store the proximity signal, wherein the first hardware processor is configured to, upon executing the instructions recorded on the first memory device, control at least one operation of the mobile computing device in accordance with the proximity signal received by the transceiver of the rfid component from the at least one rfid reader.. .
Booz Allen & Hamilton
Secure behavior analysis over trusted execution environment
Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile computing device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a behavior vector based on the observations, and provide the vector to an analyzer module in an unprivileged-secure portion of the secure operating environment.
The present invention permits the merchant or seller to transmit a url link from the merchant's website to a customer's mobile number via instant message service (“ims”) message transmitted directly from the web site page. Once received, a customer can then interact directly with a merchant or seller, from a customer's mobile computing device, via the instant messaging service.
Automated financial transactions
Arrangements relate to processing financial transactions on an automated teller machine (atm). An atm identifier can be presented on a display of the atm.
International Business Machines Corporation
Reducing the search space for recognition of objects in an image based on wireless signals
Provided is a process including: determining that a mobile computing device has crossed a geofence associated with a merchant store; sending, to a remote classifier server, a request for object-recognition classifiers for objects in the merchant store; receiving a set of object-recognition classifiers; receiving with the mobile computing device from user a request to search for offers; capturing an image with a camera of the mobile computing device; receiving one or more wireless beacon identifiers with the mobile computing device; based on the wireless beacon identifiers, selecting a subset of the object-recognition classifiers in the set of object-recognition classifiers; and recognizing an object in the captured image based on the selected subset of the object-recognition classifiers; and requesting, from a remote offer publisher server, offers corresponding to the recognized object; and receiving offers from the remote offer publisher server; and displaying the received offers to the user.. .
Device, system, and enhancing user privacy and security within a location-based virtual social networking context
A hosted virtual social network includes a plurality of users that each have a digital profile. The users are each within a predetermined distance of a venue.
Kairos Social Solutions, Inc.
Computing device heat management
The description relates to computing devices, such as mobile computing devices. One example can include a housing containing a processor.
Wireless fitness tracking and fitness analysis system
A system and method for tracking activity, such as individual or group workouts, or fitness programs. In embodiments, one or more wireless communication sensors or beacons are in wireless communication with a mobile computing device that is configured to receive data and determine a user's engagement with the sensor.
Kevin Vincent Doherty
Accounting for indoor-outdoor transitions during position determination
A determination of whether a mobile computing device is indoors or outdoors can incorporate any of a variety of factors to make an efficient and accurate determination of indoor-outdoor status. Such a status can be useful for use in conjunction with positioning services.
Method and pre-fetching remote resources for subsequent display on a mobile computing device
A computer-implemented method and system for pre-fetching remote resource data from a remote mapping system for display on a client computing device is disclosed. Data received at a client device from an online mapping system in response to a query from the client device includes vector and remote resource data.
Real-time dynamic hyperlinking system and method
A system and method enabling real-time dynamic hyperlinking of software applications and resources within mobile devices is disclosed. The system/method virtualizes the graphical user experience (gex) and user input experience (uex) that comprise the graphical user interface (gui) for host application software (has) running on a host computer system (hcs).
Elastic cloud video editing and multimedia search
Technologies for cloud-based media search and editing include a video editor configured to build a media query and associate the media query with a dynamic content slot of a media program. When generating video output based on the media program, the video editor transmits the media query to a cloud analytics server and receives 5 search results identifying one or more media clips produced by a number of mobile computing devices.
Usage modeling for intelligent management of alarms and messages in mobile health systems
Systems and methods can support usage modeling and the intelligent management of patient alarms. An alarm management system can maintain models of patient alarm operations.
Technologies for adjusting a perspective of a captured image for display
Technologies for adjusting a perspective of a captured image for display on a mobile computing device include capturing a first image of a user by a first camera and a second image of a real-world environment by a second camera. The mobile computing device determines a position of an eye of the user relative to the mobile computing device based on the first captured image and a distance of an object in the real-world environment from the mobile computing device based on the second captured image.
Supportability framework for mobile software applications
A system and a method for providing software supportability involve a server receiving a first electronic record from a client application on a mobile computing device. The first electronic record describes activity that occurred at the mobile computing device during a request sent from the client application to the server.
Dynamic cross-environment application configuration/orientation
Dynamic configuration of cross-environment applications enhances the computing experience in a computing environment with an extended active user environment and/or multiple active user environments. A mobile computing device maintains multiple active device configurations associated with multiple active user environments and/or application windows within active user environments.
Managing cognitive assistance
Technologies for managing cognitive assistance provided to a user of a cognitive assistance system include a cognitive assistance system to determine a cognitive state of the user based on sensor data generated by one or more biosensors of the cognitive assistance system. The cognitive assistance system determines whether the user requires assistance based on the determined cognitive state of the user and identifies, in response to determining the user requires assistance, a trusted mobile computing device within a vicinity of the cognitive assistance system based on a trust relationship previously established between the cognitive assistance system and the trusted mobile computing device.
System and generating expected geolocations of mobile computing devices
A computer-implemented method for generating a geographical information database associating users with one or more geolocations. The method includes the steps of receiving user identification data, geolocation data, and date and time data associated with the geolocation data from the personal computing devices of a plurality of users.
Mastercard International Incorporated
Real-time location sharing to facilitate a physical meet-up
A location sharing component operating on a mobile computing device is configured to enable a local party and a remote party to share each other's locations during a phone call to facilitate a physical meet-up. The location sharing component exposes various options to set a length of time for the location sharing or the location can be shared up until the meet-up occurs.
Distributed computing method and system
A distributed computing system is disclosed. The system includes a host computer and a plurality of mobile computing devices in communication with the host computer via a communication network.
Hon Hai Precision Industry Co., Ltd.
Active offline storage management for streaming media application used by multiple client devices
A system, method and computer program product for storing streaming media content includes: receiving streaming content, at a first mobile computing device, from a content service provider over a communications network; and determining, by a secondary mobile computing device specific details of a use of the content currently being received and buffered at the first device. The second device obtains, using the determined specific details, the content expected to be consumed by the first device to a local memory storage device at the secondary device, and stores the expected content for subsequent consumption.
International Business Machines Corporation
Method and system for protecting data flow at a mobile device
A method and system for evaluating and enforcing a data flow policy at a mobile computing device includes a data flow policy engine to evaluate data access requests made by security-wrapped software applications running on the mobile device and prevent the security-wrapped software applications from violating the data flow policy. The data flow policy defines a number of security labels that are associated with data objects.
Systems and methods for performing user recognition based on biometric information captured with wearable electronic devices
Systems and methods are disclosed herein for performing biometrics based user recognition and monitoring based on biometric information captured using wearable monitoring devices. More specifically, the present application provides systems including monitoring devices built into one or more articles of clothing that capture data relating to the wearer of the device and other subjects, such as biometric information, health vitals, environmental information, location data and the like.
Hoyos Labs Corp.
Mobile cloud service architecture
Techniques are described for implementing a cloud computer system to facilitate communication between a computing device (e.g., a mobile computing device) and enterprise computer systems. In certain embodiments, the cloud computer system may receive, from a computing device, a request for a service provided by an enterprise computer system.
Oracle International Corporation
Computer-implemented method, system, and device for providing and analyzing feedback and reviews
A computer-implemented method, system, and device for providing and analyzing feedback and reviews. The system may comprise: a feedback application and a wireless badge.
Two-stage, gesture enhanced input system for letters, numbers, and characters
A system and method that allows convenient input of letters, numbers, and characters using an input requiring a minimal number of input buttons or keys enhanced by gestures. The system utilizes a two-stage input, first with an array “call-up” function that allows a user to select a range of letters, numbers, or characters, followed by a subsequent “specification” function that allows a user to select a specific letter, number, or character from the aforementioned array.
Motion-based message display
Computer-implemented methods, apparatus, and computer program product, the method comprising: receiving a reading from a sensor associated with a mobile computing device used by a user; determining based on the reading whether the device is in movement exceeding a threshold; responsive to the movement exceeding the threshold, displaying a message in a first manner; and responsive to the movement not exceeding the threshold, displaying the message in a second manner. The first manner may be associated with the message obstructing content displayed on the device; and the second manner may be associated with content displayed on the device being obstructed less than when the movement exceeds the threshold.
Gamified electromyographic neuromuscular reeducation therapy system
A method, system and apparatus for gamified electromyographic neuromuscular reeducation therapy may include an emg receiver and a mobile computing device. In some embodiments, the mobile computing device receives an emg signal from an emg sensor couplable to a muscle of a user.
Cold temperature power throttling at a mobile computing device
The subject matter of the disclosure relates to low temperature power throttling at a mobile device to reduce the likelihood of an unexpected power down event in cold weather environments. A mobile device employing a power management solution may be configured to determine that a monitored temperature at the mobile device (at the battery of the mobile device) is below a first threshold level, and whether a hardware component (such as a camera) is active or inactive.
System and broadcasting encoded beacon signals
A method for broadcasting a beacon message by checking size of the beacon message by a beacon generation device to determine if that is greater than a specific size and then splitting the beacon message into two or more message chunks having a size less than or equal to the specific size, if the size of the beacon message is found to be greater than the specific size. The message chunks are then encoded as per a message format with multiple fields to include a message data field and packet identifiers before transmitting the message chunks sequentially in consecutive time slots through a wireless protocol.
Quantum key distribution using card, base station and trusted authority
Techniques and tools for quantum key distribution (“qkd”) between a quantum communication (“qc”) card, base station and trusted authority are described herein. In example implementations, a qc card contains a miniaturized qc transmitter and couples with a base station.
Los Alamos National Security, Llc
Flexible shock absorbing connections within a mobile computing device
The subject matter of the disclosure relates to connectors for antenna feed assemblies and display coupling components of a mobile device. The flexible connectors can be configured with a flexible spring connector component that couples a mobile device antenna to a main logic board of the mobile device within a housing of the mobile device such that the flexible connector can withstand a drop event, while at the same providing for an in-line inductance as part of an antenna-defined design requirement.
External device screen targeting
Techniques for external device screen targeting are described. In one or more implementations, location information of a mobile computing device is calculated based on a distance between the mobile computing device and multiple signal transmitters having predefined locations.
Adobe Systems Incorporated
System and providing advertisement data to a mobile computing device
A mobile computing device includes a processor, a display coupled to the processor, a memory coupled to the processor and configured to store user-specific data, and a location-determining circuit configured to determine the location of the portable electronic device. The processor is configured to provide advertisement data on the display based upon the location of the portable electronic device and the user-specific data..
Server and point-of-sale terminal configured for higher throughput processing of returned merchandise
A server includes a communication interface through which the server communicates with a mobile computing device of a user, a storage unit storing transaction data of a product purchased by the user, and a control unit. The control unit is configured to control the communication unit to transmit, to the mobile computing device, the transaction data and a link for retrieving a code symbol of the product, and in response to an operation of the link on the mobile computing device, transmit to the mobile computing device image data of the code symbol, such that the code symbol is displayed on a display unit of the mobile computing device..
Toshiba Tec Kabushiki Kaisha
Communication of external sourced information to a driver
The disclosure includes a system and method for spatial information for a heads-up display. The system includes a processor and a memory storing instructions that, when executed, cause the system to: receive object-to-vehicle (x2v) data from a first processor-based mobile computing device that broadcasts an object's position, generate object data including an object path from a second processor-based computing device programmed to perform the generating, determine vehicle data including a vehicle path, estimate a danger index for the object based on the vehicle data and the object data, identify a graphic that is a representation of the object, and position the graphic to correspond to a user's eye frame..
Toyota Jidosha Kabushiki Kaisha
Malware detection and prevention by monitoring and modifying a hardware pipeline
The various aspects provide a method for recognizing and preventing malicious behavior on a mobile computing device before it occurs by monitoring and modifying instructions pending in the mobile computing device's hardware pipeline (i.e., queued instructions). In the various aspects, a mobile computing device may preemptively determine whether executing a set of queued instructions will result in a malicious configuration given the mobile computing device's current configuration.
A mobile computing device with a mobile operating system and desktop operating system running concurrently and independently on a shared kernel without virtualization. The mobile operating system provides a user experience for the mobile computing device that suits the mobile environment.
Systems and methods for file management by mobile computing devices
Systems and methods for file management by mobile computing devices. An example method, performed by a computer system, may comprise: storing, by a computer system, a first file having a first size, in a memory; storing, in the memory, a second file derived from the first file, the second file having the second size, the second size being less than the first size; determining that the memory is not sufficient to perform a memory write operation; selecting a third file having a fourth file associated with it, the fourth file derived from the third file; and removing the third file from the memory..
Mobile application management systems and methods
An exemplary mobile application management system detects a first user input provided by a user while a first user interface associated with a first feature of a mobile application is displayed within an application display area of a display screen of a mobile computing device executing the mobile application. The first user input represents a request to transform the first user interface into a minimized widget associated with the first feature of the mobile application.
Verizon Patent And Licensing Inc.
Gesture-controlled computer system
A gesture-controlled computer system includes a mobile computing device, a range camera, and a gesture-control subsystem. The gesture-control subsystem is in communication with the mobile computing device and the range camera.
Hand Held Products, Inc.
Apparatus and method to efficiently cool a computing device
Embodiments disclosed herein include devices to cool the walls of a mobile computing device. In one embodiment, a louvered vent is formed within an external wall of a mobile computing device to create an air curtain between the external wall and a heat generating component to cool the external wall.
System and operation of the system incorporating a graphical user interface on a mobile computing device for a member of a flight crew in a vehicle cabin
A method of operation for a system incorporating a graphical user interface in a mobile computing device for a crew member within a cabin of an aircraft. The method includes displaying a menu for at least one controllable parameter, receiving a selection of the controllable parameter, displaying at least one control for the selected controllable parameter, receiving a control input for the selected controllable parameter, and adjusting the selected controllable parameter consistent with the control input.
System and a operation of the system incorporating a graphical user interface on a mobile computing device for a passenger in a vehicle cabin
A method of operation for a system incorporating a graphical user interface in a mobile computing device for a passenger within a cabin of an aircraft. The method includes displaying a menu for at least one controllable parameter, receiving a selection of the controllable parameter, displaying at least one control for the selected controllable parameter, receiving a control input for the selected controllable parameter, and adjusting the selected controllable parameter consistent with the control input.
Mobile computing device with data cognition software
A mobile computing device enabled by a customizable data cognition layer (dcl) software program to convert input information from a variety of sensors into real-time contextual messages is disclosed. The dcl software incorporates customizable software components known as plug-ins to expand the use of the mobile computing device..
Hand Held Products, Inc.
Popup sleeve for a mobile device
A sleeve for a mobile computing device. The sleeve includes a top surface, a bottom surface, and an elastic band attached to the bottom surface.
Dcaze Company Limited
Energy harvesting bidirectional audio interface
A payment card reader connected to an audio port of a mobile computing device may include a card interface, the card interface configured to read data from a payment card; a trrs connector to couple the payment card reader with the mobile computing device; and an audio interface circuit coupled with the trrs connector. The audio interface circuit may include a communication circuit configured to transmit data to and receive data from the mobile computing device via the trrs connector and an energy harvesting circuit configured to receive an audio signal via the trrs connector, to harvest energy from the audio signal, and to provide energy to other components of the card reader..
Foreground/background assortment of hidden windows
Graphical navigation of foreground and background applications running on a mobile computing device across multiple active user environments, even when graphics information for background applications is not maintained by a mobile operating system of the mobile computing device. A last graphical representation of an application screen may be captured as the application state is transitioned from the foreground state to the background state.
Occluded gesture recognition
This document describes techniques and devices for occluded gesture recognition. Through use of the techniques and devices described herein, users may control their devices even when a user's gesture is occluded by some material between the user's hands and the device itself.
Dart scoring system
A dart game system comprising a steel-tipped dart, a sisal dart board, at least one first mobile computing scoring device comprising a scoring interface, and a remote mobile computing device adapted to receive the scoring interface from the at least one scoring device for display of real-time dart game scores at a remote location.. .
System and methods for secure communication in mobile devices
A system and a method for secure communication in a mobile computing device involve obtaining, by a first program installed on the mobile computing device, an access credential from an authentication server on behalf of a second program installed on the mobile computing device. The second program submits the access credential to a remote resource as proof that the second program has been authenticated by the authentication server.
Keyless padlock and use
A keyless padlock having a padlock body, a shackle, a locking mechanism located in the body and associated with the shackle to lock the shackle to the body in a locked condition and to release at least a part of the shackle in an unlocked condition, the locking mechanism including a signal receiver, at least one control assembly and at least one actuator, the locking mechanism being unlocked upon verification of a signal including an unlock code transmitted by a mobile computing device.. .
Dog & Bone Holdings Pty Ltd
Database building and data matchmaking software system and use
A software application for matching a first data category with one or more additional data categories. The system provides two or more columns which can be individually scrolled through to allow for matching of data elements in one column with data elements in another column.
Job Shakers, Llc
Systems for securely connecting to remote networks
Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device..
National Information Assurance Corporation
Method and beacon messaging point of sale messaging and delivery system
An electronic kiosk receives a plurality of messages. The kiosk has a transceiver to utilize a set of radio communication technologies to detect and establish a radio communication link with a mobile computing device when the mobile computing device is located within proximity of the electronic kiosk.
Sony Computer Entertainment America Llc
Drone safety alert monitoring system and method
A wearable safety alarm system includes one or more processors to receive identifying information and transmit the identifying information to an alarm response server from a mobile computing device, receive, by the mobile computing device, a unique identifier that identifies the identifying information in database associated with the alarm response server, receive a trigger of an alarm notification by one of a wearable device and the mobile computing device, determine a current location of the mobile computing device, transmit an alarm notification message to the alarm response server, the alarm notification message including the current location of the mobile computing device and the unique identifier, and transmit the current location of the mobile computing device to at least one drone.. .
Clandestine Development, Llc
Techniques for wireless communication of proximity based marketing
A system and method for wireless communication of proximity based marketing is provided. The method includes determining whether a proximity device and a mobile computing device are within a first proximity to each other, wherein the proximity device is associated with at least one of a product and a service, and communicating information indicating that the proximity device and the mobile computing device are within the first proximity to each other, when it is determined that the proximity device and the mobile computing device are within the first proximity to each other..
Radeum, Inc. Dba Freelinc
Optical interpretation of assay results
The inventive concepts disclosed herein are generally directed to the use of a hand-held mobile computing device, such a smartphone or tablet, to interpret the results of a medical assay device. By controlling conditions like image placement and illumination and correcting for imperfect illumination, accurate results can be obtained with hand-held mobile computing device..
Siemens Healthcare Diagnostics Inc.
Pushing secure notifications to mobile computing devices
Techniques are provided for pushing secure notifications to a mobile computing device. For example, a method for pushing secure notifications includes a push service platform receiving a push notification message request from an entity registered with the push service platform, processing the push notification message request to generate a secure push notification message, and sending the secure push notification message to a target mobile computing device through a native third-party push service associated with the target mobile computing device.
International Business Machines Corporation
Accessory and mobile computing device communication using an application communication protocol
Embodiments of the present invention provide various communication techniques for communication between a mobile computing device and an accessory. An accessory protocol that is generic to the mobile computing device can be used for some communication.
Technique to prevent ipv6 address exhaustion in prefix delegation mode for mobile access point routers
Methods, devices, systems, and non-transitory process-readable storage media include methods for preventing ipv6 address exhaustion in prefix delegation mode by a software-enabled access point (“softap”) mobile computing device providing an internet protocol version 6 (ipv6) wide area network (wan) connection to a plurality of client devices. A processor of a softap mobile computing device may include assigning an unassigned prefix of a pool of available prefixes to a client device connected to a local area network (lan) established by the softap mobile computing device.
Technique to delegate prefixes to wi-fi clients connected to mobile access point routers
Methods, devices, systems, and non-transitory process-readable storage media of the various embodiments enable a software-enabled access point mobile computing device to delegate prefixes to already connected local area network (lan) client devices upon establishment or re-establishment of a data connection. The various embodiments may enable a mobile computing device configured to operate as a mobile router (i.e., a softap mobile computing device) to support prefix delegation by providing unique ipv6 prefixes to connected lan client devices..
System and securely retrieving private data from customer mobile device
A method and system for handling private user data in transactions between mobile devices and destination websites for e-commerce or other electronic transactions involving private user data. In particular, the present invention relates to a method and system for facilitating a secure transaction without requiring a user to login into the e-commerce website with a user name and password while allowing the user to maintain control over their personal information.
System and single-touch engagement with social media and other sites
A mobile computing device running application software is provided that enables the aggregation of data from multiple sources into a single main feed, and is configured to receive touch input into the form of custom gestures. In an embodiment, a single gesture activates custom action related to data in the main feed.
Fortune Favors The Bold
Buttonless display activation
In one example, a method includes determining, by a first motion module of a computing device and based on first motion data measured by a first motion sensor at a first time, that the mobile computing device has moved, wherein a display operatively coupled to the computing device is deactivated at the first time; responsive to determining that the computing device has moved, activating a second motion module; determining, by the second motion module, second motion data measured by a second motion sensor, wherein determining the second motion data uses a greater quantity of power than determining the first motion data; determining a statistic of a group of statistics based on the second motion data; and responsive to determining that at least one of the group of statistics satisfies a threshold, activating the display.. .
Augmenting mobile computing device audio output via vibration elements
Embodiments of the invention utilize one or more vibration elements to enhance the audio output of a computing device. These vibration element(s) may comprise any conventional vibrating element including a mass element (i.e., counterweight) electrically driven via an actuator to produce the vibrations.
System and process for location-based information retrieval
Systems, devices and methods are provided for solving technical problems related to communicating between two or more unrelated mobile devices based on location without needing contact information for the unrelated mobile computing devices. In various implementations, the service is adapted to use a common user base for a location-based matching process.
Safety water application
Embodiments relate generally to methods and systems for configuring a safety monitor application in a handheld mobile computing device comprising a movement detecting component and a wireless communications subsystem. An example method comprises: downloading the safety monitor application and storing the safety monitor application in a memory of the computing device, obtaining an activation code associated with an online configuration server, activating the safety monitor application using the activation code, retrieving configuration information from the online configuration server based on the activation code and implementing the configuration information to configure operations of the safety monitor application..
South East Water Corporation
Platform-agnostic video player for mobile computing devices and desktop computers
A platform-agnostic video player for mobile computing devices and desktop computers for playback of video and audio files on arbitrary computing devices, including mobile devices, laptop and desktop computers. The platform-agnostic video player for mobile computing devices and desktop computers generally includes a file retrieval component suitable for receiving a video or audio file; a video and audio decoding software component capable of decoding encoded video or audio data into a format suitable for display or playback; a video display and audio playback component; and a user interaction component..
Methods and systems for a reminder servicer using visual recognition
A downloadable reminder application uses object recognition technology to recognize one or more objects appearing on a display screen of the mobile computing device and matches them to a set of known target objects. The downloadable reminder application process any associated trigger conditions for the target object.
Autonomy Corporation Limited
Mobile computing device technology and systems and methods utilizing the same
mobile computing device technology and systems and methods using the same are described herein. In particular, mobile computing devices that may serve as a processing component of a disaggregated computing system described, non-integral screens that may be paired with the mobile computing devices, and systems and methods using such devices and screens are described.
Online to offline commerce merchant advertising
A system for merchant advertising can be utilized to enable merchants to dynamically advertise products and services to consumers based on the consumers' location, time, and/or intent and through the consumer's mobile or non-mobile computing device. Consumers can submit queries for products, services, and/or merchants via various search engine(s), search engine application(s), and/or merchant portal application(s) to indicate intent.
Mobile communication device with proximity based communication circuitry
A mobile computing device has processors, memory, voice communication circuitry, and communication circuitry configured to receive a request from a server for information to complete an information exchange. The computing device also has a display device configured to display at least one user interface window in response to receiving the request from the server.
Functional test automation for gesture-based mobile applications
A method for cloud-based functional testing of a mobile application includes running a functional test program on a server. The functional test program provides a graphical user interface (gui) that allows a user to select a mobile application and a mobile computing device having a touch-sensitive display screen for receiving user input.
Automated mobile application verification
Disclosed are various embodiments for automatically testing and verifying mobile applications. A mobile application is obtained from a source entity.
Amazon Technologies, Inc.
Range management with bluetooth low energy
An example method for adjusting the range of transmission of advertising packets is disclosed. In particular, method includes receiving, from an application executing on a mobile computing device, a request.
Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (uicc)
A method provides end-to-end security for transport of a profile to a target device (e.g., a mobile computing device) over at least one communications network that includes a plurality of nodes. In accordance with the method, the profile is encrypted for transport between the target device and an initial node of the network through which the profile is transported.
Google Technology Holdings Llc
Computer implemented methods for protecting and promoting products of a given brand by using machine readable codes
Computer implemented methods for protecting and promoting products of a given brand by using machine readable codes, including assigning, by a given brand, a particular value to a machine readable code localized in a packaging of a product; a user scanning the machine readable code by using a mobile computing device having installed therein a processor adapted to read the machine readable code; upon the scanning being performed, establishing communication between the processor and a remote server for storing the scanned code and performing a series of checkings of the scanned code; depending on the result of the checkings the remote server assigns a monetary compensation from the brand to the user that is delivered through the processor; and the processor informing the user about the checking, wherein the machine readable code contains information regarding a marketing campaign of the given brand, a product code and the particular value encrypted.. .
Proximity based social networking
A system and method for proximity based social networking is disclosed between mobile computing devices each having a short range communication (src) device using near field magnetic induction. The src devices can include at least two antennas to provide magnetic induction diversity.
System and blocking or delaying notifications on a mobile device while simultaneously allowing approved integrated functionality
Embodiments of the present invention are generally directed towards systems and methods for altering operation of a mobile computing device. Specifically, embodiments of the present invention are directed to providing systems and methods for blocking or delaying notifications on a mobile device while simultaneously allowing approved integrated functionality.
Methods and leveraging a mobile phone a mobile phone or mobile computing device for use in controlling model vehicles
Methods and systems for utilizing a mobile computing device (e.g., such as a mobile phone) for use in controlling a model vehicle are described. Consistent with some embodiments, a mobile computing device provides various user controls for generating signals that are communicated to a radio transmitter device coupled with the mobile computing device, and ultimately broadcast to a receiver residing at a model vehicle.
Point-of-sale payment system and related methods
Embodiments may relate to a co-operable set of computer programs for making electronic payments. The set of computer programs may be adapted to run on distributed computing devices such as, without limitation, a mobile computing device, a remote server, and a point-of-sale computer system.
Providing results to parameterless search queries
In one implementation, a computer-implemented method includes receiving a parameterless search request, which was provided to a mobile computing device, for information that is relevant to a user of the mobile computing device. The method also includes, in response to the received parameterless search request, identifying with a digital computer system one or more results that are determined to be relevant to the user of the mobile computing device based upon a current context of the mobile computing device.