Follow us on Twitter
twitter icon@FreshPatents


Mobile Computing Device patents

      

This page is updated frequently with new Mobile Computing Device-related patent applications.




 Substantially continuous location logging for geographic-positioning capable devices patent thumbnailnew patent Substantially continuous location logging for geographic-positioning capable devices
In one embodiment, a mobile computing device has a first processor and a second processor. The mobile device determines an operating condition of the mobile device, the operating condition being based on at least the current time of day, a current activity of a user associated with the mobile device, or a current proximity of the mobile device to a place connected to the user of the mobile device through an on-line social network.
Facebook, Inc.


 System and  superimposing spatially correlated data over live real-world images patent thumbnailnew patent System and superimposing spatially correlated data over live real-world images
Systems, methods, and other embodiments are disclosed that augment a visually displayed portion of a facility with superimposed virtual elements. In one embodiment, mobile position data is generated based on non-optical sensor readings taken by a mobile computing device.
Oracle International Corporation


 Method and system for identifying potentially successful dating relationship patent thumbnailnew patent Method and system for identifying potentially successful dating relationship
A method for identifying people who are potentially to have a successful dating relationship including embedding an application within a mobile computing device, having at least a first user and a second user to sign in into each's respective mobile device application to initiate a session; allowing the application to generate a question to the first user and the second user; deciding either the first user or the second user is in command mode; answering the question with response to each other by the first user and the second user; allowing the first user or the second user in command mode to decide if the received response is satisfactory; moving the first user or the second user forward or backward from an end point depending on whether the response is satisfactory.. .

 Local personal daemon patent thumbnailnew patent Local personal daemon
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. While the personal daemon maintains personal information corresponding to the associated user, the personal daemon is configured to not share the personal information of the associated user with any other entity other than the associated user except under conditions of rules established by the associated user.
Microsoft Technology Licensing, Llc


 Apparatus and  profiling users patent thumbnailnew patent Apparatus and profiling users
Provided is a process of profiling a user of a mobile computing device, the process including: obtaining a location history of a user, the location history being based on signals from a mobile computing device of the user; obtaining a location-attribute score of a location identified in, or inferred from, the location history; determining, with a computer, a user-attribute score based on the location-attribute score; and storing the user-attribute score in a user-profile datastore.. .
Placeiq, Inc.


 Location-based buffer management systems and methods patent thumbnailLocation-based buffer management systems and methods
An exemplary method includes a buffer management system tracking a geographic location of a mobile computing device while the mobile computing device receives streaming content by way of a network; determining, based on the tracked geographic location, that the mobile computing device is approaching a geographic area designated as having a network connectivity level that is below a predetermined threshold; and dynamically increasing, in response to determining that the mobile computing device is approaching the geographic area and based on the tracked geographic location of the mobile computing device, a size of a buffer maintained by the mobile computing device and used to present the streaming content by way of the mobile computing device. Corresponding systems and methods are also described..
Verizon Patent And Licensing Inc.


 Application launching in conjunction with an accessory patent thumbnailApplication launching in conjunction with an accessory
An application can be launched in response to a launch request from an accessory. For example, the mobile computing device can determine whether it is in a state that allows launching of an application and/or can determine whether the application or application type requested in the launch command is available for launching.
Apple Inc.


 Public transit vehicle route schedule and notification system patent thumbnailPublic transit vehicle route schedule and notification system
In an embodiment, a route schedule and notification system which includes a computer-implemented method in a mobile computing device is for collecting route context from a plurality of passengers along a roadway, transmitting the route context to a route context analytics server, providing an estimation of vehicle arrived to a target vehicle stop, generating an estimated arrival time notification for passenger to plan the schedule to wait for a vehicle arrival. Also, an embodiment, a route schedule and notification system which includes a computer-implemented method in the route context analytics server is for analysing, predicting or estimating the vehicle arrival and departure time, calculating the travel time of vehicle on the road, determining an alternative route to reach the destination, generating the real arrival time notification for passenger to plan the schedule to wait for a vehicle arrival..

 System,  confirming fixture/display assembly and/or compliance patent thumbnailSystem, confirming fixture/display assembly and/or compliance
Disclosed herein are systems, methods and apparatus for confirming fixture/display assembly and/or compliance. In some forms, systems, methods, and apparatus are disclosed for assessing the accuracy of fixture and display assemblies or setups and/or confirming compliance of fixtures and displays at specific periods of time.
Dci Marketing, Inc.


 Wearable retina/iris scan authentication system patent thumbnailWearable retina/iris scan authentication system
A wearable retina/iris authentication system includes: a frame; a retina/iris scanner mounted to the frame for capturing images of a retina and/or an iris of a user; a mobile computing device, the mobile computing device including a memory for storing information about the user; a position determining device coupled to the mobile computing device for continuously determining a location of the user and providing the location to the mobile computing device; a display mounted to the frame and coupled to the mobile computing device for displaying information received from the mobile computing device; a database for storing information about one or more of a plurality of retina images and a plurality of iris images for matching with the captured images of one or more of the retina and the iris of the user; and a communication interface for comminuting with external systems remote to the wearable system.. .
Raytheon Company


Systems and methods to facilitate submission of user images descriptive of locations

Systems and methods to facilitate the submission of user images that are descriptive of a location or point of interest are provided. One example computer-implemented method includes determining a location at which a first image was captured by a mobile computing device.
Google Inc.

Time-based installation and uninstallation of applications

Aspects of the present invention disclose a method, computer program product, and system for managing applications on a computing device. The method includes one or more processors receiving a user utilizing a scheduling function of a computing device to schedule a time to uninstall an application from the computing device.
International Business Machines Corporation

Automated security system for schools and other structures

Disclosed are various embodiments for security systems for schools and similar structures. Various security devices may be monitored in a structure, such as a school, where at least one of the security devices includes a wall-mounted duress alarm, an electronic keypad, a radio-frequency identification (rfid) reader, a card access reader, a decibel meter, a smoke detector, or a mobile computing device.
S.h.i.e.l.d., Llc

Method for providing health therapeutic interventions to a user

A method and system for digitally providing healthcare to a patient, the method including receiving a log of use dataset associated with patient digital communication behavior at a mobile computing device, wherein the first log of use dataset corresponds to a time period; receiving a supplementary dataset corresponding to the time period; receiving a survey response dataset from the patient, the survey response dataset corresponding to the time period; receiving a care provider dataset in association with the time period; selecting a therapeutic intervention from a set of therapeutic interventions, based on processing with at least one of the first log of use dataset, the supplementary dataset, the survey response dataset, and the care provider dataset; generating a dynamic care plan modifiable over a time period; promoting the therapeutic intervention according to the dynamic care plan.. .
Ginger.io, Inc.

System and printing

Systems, methods, and computer-readable media are provided. Some embodiments include maintaining, at a mobile computing device, a record associated with a print job submitted to a first printing device, the record including information for locating the first printing device and information that identifies the print job.
Canon U.s.a., Inc.

Method and system for modeling behavior and heart disease state

A method for evaluating cardiovascular health of a patient includes receiving a log of use dataset associated with patient digital communication behavior at a mobile computing device, wherein the log of use dataset is associated with a time period, receiving a supplementary dataset associated with the time period, generating a survey dataset based on a patient response to a survey, generating a cardiovascular health predictive model based upon at least one of the log of use dataset, the supplementary dataset, and the survey dataset, extracting a cardiovascular health metric from at least one of an output of the cardiovascular health predictive model, the log of use dataset, the supplementary dataset, and the survey dataset, wherein the cardiovascular health metric is associated with the time period; providing a cardiovascular-related notification to the patient; and automatically providing a cardiovascular therapeutic intervention at a cardiovascular device for the patient.. .
Ginger.io, Inc.

Technologies for localized audio enhancement of a three-dimensional video

Technologies for localized audio enhancement of a three-dimensional video include capturing a three-dimensional video including depth data using a three-dimensional camera of a mobile computing device and receiving a three-dimensional audio associated with the three-dimensional video using a microphone array. A user may enhance localized audio by selecting a region of the three-dimensional image from the three-dimensional video.

Method and system for replicating a communication application on an auxiliary computing device

According to embodiments described in the specification, a method and system for replicating an application on an auxiliary computing device are provided. The system includes the auxiliary computing device, a mobile computing device executing the application, and at least one server.
Kik Interactive Inc.

System and assessing vulnerability of a mobile device

A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device.. .
Duo Security, Inc.

Data loss prevention for mobile computing devices

System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (i/o) functionality of the mobile computing device.
Mcafee, Inc.

Securedinter-application communication in mobile devices

This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (id) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network.. .
Salesforce.com, Inc.

Mobile hardware for automated response to distress signal

A system for facilitating automated response to a distress signal includes an attachment for a multifunction mobile computing device. In some embodiments, the attachment removably articulates to a sensor location coupled to a housing of the multifunction mobile computing device.
Alert Media, Inc.

Tracking mobile app installations

In an embodiment, a data processing method comprises receiving, at a mobile computing device, a request comprising a protocol identifier, a label value, and a data value, wherein the protocol identifier is associated with a protocol implemented in a first mobile app; using a protocol handler in the mobile computing device associated with the protocol, initiating processing of the request; using a native code element in the mobile computing device: intercepting the request when the label value matches a particular expression, and in response to the intercepting, providing the data value to other than the first mobile app, the protocol handler or the native code element; wherein the method is performed by one or more computing devices.. .
Tapjoy, Inc.

Providing location-based feedback services

Facilitating rendering of a digital gratuity, with or without an associated value, to a service worker by a customer. A communication device associated with a geographical area and at least one service worker can be detected by a mobile computing device associated with a customer.
Bumpd, Inc.

Masking sensitive data in mobile applications

In an approach to masking data in a software application associated with a mobile computing device, one or more computer processors receive a request to display data in a software application on a mobile computing device. The one or more computer processors determine whether one or more masking rules apply to the data, where determining whether one or more masking rules apply to the data is performed by an instrumentation of application binary of the software application.
International Business Machines Corporation

Technologies for depth-based user authentication

Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password..
Intel Corporation

Integration of force tranducer into tablet to measure weight

Methods and apparatus relating to integration of force transducer into a mobile computing device to measure weight are described. In an embodiment, logic receives a load detection signal from one or more load sensors coupled to the mobile computing device.
Intel Corporation

System and automatic measurement and recording

A method and apparatus for automatically measuring and storing a various measured values of an item, or a sequence of measured values of one or more item(s) suitable for single-handed use by a user. In particular, the present invention relates to a mobile computing device with one or more sensors for determining when to measure and record a particular value of one or more items.
Squadle, Inc.

Method and controlling input to a mobile computing device located inside a vehicle

A wireless transmission system is provided that includes a transmission apparatus that transmits a wireless signal indicative of a vehicle parameter. The system includes a mobile computing device having an input device for accepting user input and a wireless transceiver configured to receive the wireless signal.
Invictus Technology Group, Inc.

Automated response to duress in distress signals

A system for facilitating automated response to a distress signal includes an attachment for a multifunction mobile computing device. In some embodiments, the attachment removably articulates to a sensor location coupled to a housing of the multifunction mobile computing device.
Alert Media, Inc.

Methods for automated response to distress signals

A system for facilitating automated response to a distress signal includes an attachment for a multifunction mobile computing device. In some embodiments, the attachment removably articulates to a sensor location coupled to a housing of the multifunction mobile computing device.
Alert Media, Inc.

Method and controlling input to a mobile computing device located inside a vehicle

A wireless transmission system and method is provided for use in a vehicle having an on-board diagnostic (obd) system configured to provide vehicle speed data and engine operation status data. A transmission apparatus is interfaceable with the on-board diagnostic system.
Invictus Technology Group, Inc.

Object tracking

Embodiments are disclosed herein that relate to the automatic tracking of objects. For example, one disclosed embodiment provides a method of operating a mobile computing device having an image sensor.
Microsoft Technology Licensing, Llc

System for end-user management of a bandwidth of telecommunications services

Disclosed embodiments include applications, computing devices configured with the applications, and computer implemented methods to provide user interfaces on the mobile computing devices to allow customers to manage and change bandwidth allocation for their services without taking down the telecommunications services.. .
Transition Networks, Inc.

Wireless incentive system for vehicle users

The disclosure includes a system and method for determining, based on vehicle sensor data associated with the vehicle, a current vehicle condition that is detrimental to operation of the vehicle, transmitting, by a mobile computing device programmed to perform the transmitting, a description of the current vehicle condition to a condition message provider, and receiving a condition message that includes offer data and mitigating plan data describing one or more steps configured to alter the current vehicle condition.. .
Toyota Infotechnology Center Usa, Inc.

Data transfer between mobile computing devices using short-range communication systems

Transferring data between mobile computing device by converting contact information stored in a proprietary format on the first mobile computing device to a nonproprietary graphical format, transferring the contact information in the nonproprietary graphical format from the first mobile computing device to a second mobile computing device and storing the contact information in the nonproprietary graphical format on the second mobile computing device. The contact information stored in the nonproprietary graphical format on the second mobile computing device can be converted to the proprietary format and stored on the second mobile computing device.
Bcard, Inc.

Techniques for machine language translation of text from an image based on non-textual context information from the image

A computer-implemented technique can include receiving, at a server from a mobile computing device, the server having one or more processors, an image including a text. The technique can include obtaining, at the server, optical character recognition (ocr) text corresponding to the text, the ocr text having been obtained by performing ocr on the image.
Google Inc.

Technologies for optimally individualized building automation

Technologies for individualized building automation include a building automation application server, a building controller, and several mobile computing devices. Each mobile computing device generates individualized sensor data based on the time and location of the mobile computing device and sensor data indicative of a building system control parameter.
Abb Technology Ltd.

Connection-oriented messaging and signaling in mobile heath networks

Systems and methods can support connection-oriented messaging and signaling. Connection-oriented messaging channels may be established between wireless mobile computing devices within a local-area wireless network.
Voalte, Inc.

Adaptive mobile wireless call rescue

Systems and methods can support establishing a voice call over a wireless computer network between a mobile computing device and a second device, where the second device may be either another mobile device or a gateway for communicating to a traditional landline or mobile telephone. The connectivity status of the mobile computing device may be monitored.
Voalte, Inc.

Method and system for a light-weight mobile computing device

Methods and systems provide the wireless use of a desktop computer through a lightweight long-range mobile computing device with extended battery life and no writeable or user-accessible persistent data storage, such as a hard drive, which could be detrimental if lost. The light-weight mobile computing may not run a full operating system, thereby reducing overhead and increasing speed.
Avocent Corporation

Method and system for a light-weight mobile computing device

Methods and systems provide the wireless use of a desktop computer through a lightweight long-range mobile computing device with extended battery life and no writeable or user-accessible persistent data storage, such as a hard drive, which could be detrimental if lost. In one implementation, the light-weight mobile computing does not run a full operating system, thereby reducing overhead and increasing speed.
Avocent Corporation

Apparatus, controlling an image processing device via a mobile device

An image processing device is provided that generates a graphical user interface including at least one image element that enables receipt of a data value of a particular type therein, the graphical user interface being generated in response to selecting a processing job to be performed by the image processing device. The generated graphical user interface is mirrored to a mobile computing device by transmitting data representative of the graphical user interface to a mobile computing device via a short distance communication protocol.
Canon U.s.a., Inc.

Generating advertisements based on proximate computing devices

Techniques include identifying one or more proximate devices (e.g., networked computing devices, or networked appliances) that are located proximate to a user device (e.g., a mobile computing device, such as a smartphone, or a tablet) using a local wireless network (e.g., wi-fi, bluetooth, or nfc). The techniques further include generating one or more advertisements (ads) based on the identified proximate devices, based on one or more device types (e.g., categories) associated with the devices, and/or based on one or more states of the devices.
Quixey, Inc.

Gesture touch inputs for controlling video on a touchscreen

In general, this disclosure describes novel techniques for controlling video content on a computing device, such as a mobile computing device. For example, a computing device may execute a media application that provides a video output to a presence-sensitive screen of the computing device.
Google Inc.

Method and system for cardiovascular disease assessment and management

An embodiment of a method for assessing cardiovascular disease in a user with a body region using a mobile computing device including a camera module, includes receiving a time series of image data of a body region of the user, the time series of image data captured during a time period; generating a photoplethysmogram dataset from the time series of image data; generating a processed ppg dataset; determining a cardiovascular parameter value of the user based on the processed ppg dataset; fitting a chronobiological model to (1) the cardiovascular parameter value, and (2) a subsequent cardiovascular parameter value, characterizing a cardiovascular parameter variation over time of the user based on the fitted chronobiological model; and presenting an analysis of the cardiovascular parameter variation to the user at the mobile computing device.. .
Vital Labs, Inc.

Systems and methods for avoiding stalls in network connectivity at a computing device

The embodiments set forth techniques for avoiding network connectivity stalls at a mobile computing device. In an idle state, a performance analyzer executing on the mobile computing device is configured to passively analyze high-level network connectivity information to detect any minor issues with the network connectivity being provided by a primary interface (e.g., wifi).
Apple Inc.

Mobile device proximity notification

Aspects of the present invention disclose a method, computer program product, and system for mobile computing device proximity notification. The method includes one or more processors acquiring location information for a plurality of mobile computing devices.
International Business Machines Corporation

System and predicting changes in network quality

Disclosed herein is a technique for predicting network availability and quality specific to particular types of networks over a particular period of time. The prediction of network availability and quality is based on usage patterns associated with a user of a user device (e.g., a mobile computing device).
Apple Inc.

Personalizing advertisements based on proximate computing devices

Techniques include generating an advertisement (ad) including text and/or image data using a user device (e.g., a mobile computing device). The techniques further include identifying one or more proximate devices (e.g., networked computing devices or appliances) located proximate to the user device using a local wireless network (e.g., wi-fi, bluetooth, or nfc).
Quixey, Inc.

Generating advertisements based on proximate computing devices

Techniques include identifying one or more proximate devices (e.g., networked computing devices, or networked appliances) that are located proximate to a user device (e.g., a mobile computing device, such as a smartphone, or a tablet) using a local wireless network (e.g., wi-fi, bluetooth, or nfc). The techniques further include generating one or more advertisements (ads) based on the identified proximate devices, based on one or more device types (e.g., categories) associated with the devices, and/or based on one or more states of the devices.
Quixey, Inc.

Systems and methods for providing predictions to applications executing on a computing device

The embodiments set forth techniques for implementing various “prediction engines” that can be configured to provide different kinds of predictions within a mobile computing device. According to some embodiments, each prediction engine can assign itself as an “expert” on one or more “prediction categories” within the mobile computing device.
Apple Inc.

Generation of salient contours using live video

In various implementations, a computing device is configured to provide a live preview of salient contours generated on a live digital video feed. In particular, a designer can use a computing device with a camera, such as a smart phone, to view a real-time preview of salient contours generated from edges detected in frames of a live digital video feed prior to capture, thereby eliminating the unpredictability of salient contours generated from a previously captured image.
Adobe Systems Incorporated



Mobile Computing Device topics:
  • Mobile Computing Device
  • Computing Device
  • Mobile Computing
  • User Interface
  • Tablet Computer
  • Augmented Reality
  • Smartphone
  • Coordinates
  • Information Technology
  • Information Management
  • Asset Management
  • Telematics
  • Communications
  • User Profile
  • Computer System


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Mobile Computing Device for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Mobile Computing Device with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.308

    file did exist - file did put3124

    3 - 1 - 53