FreshPatents.com Logo
Enter keywords:  

Track companies' patents here: Public Companies RSS Feeds | RSS Feed Home Page
Popular terms

[SEARCH]

Mobile Computing topics
Mobile Computing
Mobile Computing Device
Computing Device
Augmented Reality
Smartphone
Tablet Computer
User Interface
Asset Management
Communications
Telematics
User Profile
Computer System
Transactions
Credit Card
Authentication

Follow us on Twitter
twitter icon@FreshPatents

Web & Computing
Cloud Computing
Ecommerce
Search patents
Smartphone patents
Social Media patents
Video patents
Website patents
Web Server
Android patents
Copyright patents
Database patents
Programming patents
Wearable Computing
Webcam patents

Web Companies
Apple patents
Google patents
Adobe patents
Ebay patents
Oracle patents
Yahoo patents

[SEARCH]

Mobile Computing patents



      
           
This page is updated frequently with new Mobile Computing-related patent applications. Subscribe to the Mobile Computing RSS feed to automatically get the update: related Mobile RSS feeds. RSS updates for this page: Mobile Computing RSS RSS


Communication between a mobile computing device and an accessory device using a reconfigurable accessory communication…

Method and system to automatically track user's time of using mobile computing device for purpose of billing clients

Wildfire mitigation services in-network approach with an insurance policy

Date/App# patent app List of recent Mobile Computing-related patents
09/11/14
20140259092
 Access control to files based on source information patent thumbnailAccess control to files based on source information
The present invention is a security tool for protection of data on a mobile computing device. The security tool provides a plurality of security policies to be enforced based on source information for the data and a location associated with a network environment in which a mobile device is operating.
09/11/14
20140258562
 Communication between a mobile computing device and an accessory device using a reconfigurable accessory communication protocol patent thumbnailCommunication between a mobile computing device and an accessory device using a reconfigurable accessory communication protocol
In a method of controlling an accessory device by a mobile computing device, upon being communicatively coupled with the accessory device, the mobile computing device communicates with the accessory device using an accessory communication protocol to receive accessory information, and protocol configuration data associated with a specific application executable on the accessory device. The mobile computing device reconfigures the accessory communication protocol based on the protocol configuration data to obtain a reconfigured accessory communication protocol, and then communicates with the accessory device using the reconfigured accessory communication protocol to control execution of basic functionality and the specific application on the accessory device..
09/11/14
20140258057
 Method and system to automatically track user's time of using mobile computing device for purpose of billing clients patent thumbnailMethod and system to automatically track user's time of using mobile computing device for purpose of billing clients
A computer-implemented method and system for managing billable hours, the method including the selecting a client from an electronic client directory upon receiving the client's contact for a service; the launching a digital timer for the selected client to record time spent for the requested service; stopping the timer when the service provided for said contact is done; an updating the client's account with the recorded time.. .
09/11/14
20140257864
 Wildfire mitigation services in-network approach with an insurance policy patent thumbnailWildfire mitigation services in-network approach with an insurance policy
Methods and systems provide mitigation insurance and a network of service providers who perform the mitigation work at a discount rate for members who own mitigation insurance policies. Through mitigation insurance, embodiments of the present invention provide predictable, negotiated price for mitigation services and qualified service providers to the members of an insurance company.
09/11/14
20140257862
 Mobile application for risk management patent thumbnailMobile application for risk management
A system and method provide determining a risk of a natural hazard associated with a piece of real property and identifying mitigatable items located around the property by collecting local data using at least one sensor. The local data includes information related to risk factors associated with the property.
09/11/14
20140253743
 User-generated content in a virtual reality environment patent thumbnailUser-generated content in a virtual reality environment
The systems and methods allow users of mobile computing devices to generate augmented reality scenarios. Augmented reality content is paired with a real world trigger item to generate the augmented reality scenario.
09/11/14
20140253565
 System on chip having processing and graphics units patent thumbnailSystem on chip having processing and graphics units
System on chip comprising a general purpose processing element, a graphics processing unit and a display interface, supporting graphics visualization on mobile computing devices and on embedded systems.. .
09/04/14
20140250245
 Modifying functionality based on distances between devices patent thumbnailModifying functionality based on distances between devices
Described herein are techniques and systems that allow modification of functionalities based on distances between a shared device (e.g., a shared display, etc.) and an individual device (e.g., a mobile computing device, etc.). The shared device and the individual device may establish a communication to enable exchange of data.
09/04/14
20140250017
 Methods for secure transmission of sensitive data and devices thereof patent thumbnailMethods for secure transmission of sensitive data and devices thereof
A method, non-transitory computer readable medium and transaction management device comprising receiving data encrypted using a public asymmetric key and a symmetric key from a mobile computing device, wherein the public asymmetric key and the symmetric key is shared between the transaction management device and the mobile computing device prior to receiving the data. The received data is decrypted using the received symmetric key and an asymmetric private key, wherein the asymmetric private key is generated by the transaction management device prior to receiving the data.
09/04/14
20140249919
 System for generating revenue from mobile social networking patent thumbnailSystem for generating revenue from mobile social networking
A system and method for improved advertising revenue streams for social networking service providers via automatic exchange of information shared by individuals on social networking service providers and/or their mobile computing devices, wherein said exchanged information contains implied or explicit advertisements is disclosed.. .
09/04/14
20140248851
Providing network access
A wireless service provider identifies a mobile computing device capable of short-range wireless communication and in an agreement to receive service from a cellular network. The wireless service provider provides, to the mobile computing device, terms for a third party computing device to accept in order to gain access to the cellular network via the mobile computing device.
08/28/14
20140245306
Adaptive observation of behavioral features on a heterogeneous platform
Methods, devices and systems for monitoring behaviors of a mobile computing device include observing in a non-master processing core a portion of a mobile device behavior that is relevant to the non-master processing core, generating a behavior signature that describes the observed portion of the mobile device behavior, and sending the generated behavior signature to a master processing core. The master processing core combines two or more behavior signatures received from the non-master processing cores to generate a global behavior vector, which may be used by an analyzer module to determine whether a distributed software application is not benign..
08/28/14
20140245170
Systems, devices, or methods for accessing information employing a tumbler-style graphical user interface
A tumbler-style graphical user interfaces (tsgui) facilitates high context rapid selection of content objects from at least a plurality of tumbler components. Selection of content objects can relate to a path for a memory to access a related final information.
08/28/14
20140245166
Artwork ecosystem
A computer-implemented method performed at a computer system including one or more processors and memory storing one or more programs for execution by the one or more processors, wherein the computer system hosts a media management system. The computer system receives a selection of a media content item from a plurality of media content items stored on the computer system and an intended display device from a mobile computing device associated with a user of the media management system.
08/28/14
20140245015
Offline file access
In embodiments of the present invention improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in the secure database, each of the plurality of encryption keys providing access to the encrypted data file, the encrypted data file accessible as downloaded to a mobile computing device that is not connected to the network only through use of at least one of the plurality of encryption keys and presentation of a user secure identifier from a user of the mobile computing device, wherein the at least one of the plurality of encryption keys allows the user of the mobile computing device to access the encrypted data file a limited number of times.. .
08/28/14
20140244683
Providing results to parameterless search queries
In one implementation, a computer-implemented method includes receiving a parameterless search request, which was provided to a mobile computing device, for information that is relevant to a user of the mobile computing device. The method also includes, in response to the received parameterless search request, identifying with a digital computer system one or more results that are determined to be relevant to the user of the mobile computing device based upon a current context of the mobile computing device.
08/28/14
20140244411
Method of operating a duty-free store at an airport with a product storage area and product pickup area
The disclosure provides a method of operating a duty-free retail operation at an airport. The airport includes a secure zone and a non-secure zone, which are separated for passengers by a security checkpoint.
08/28/14
20140244253
Systems and methods for continual speech recognition and detection in mobile computing devices
The present application describes systems, articles of manufacture, and methods for continuous speech recognition for mobile computing devices. One embodiment includes determining whether a mobile computing device is receiving operating power from an external power source or a battery power source, and activating a trigger word detection subroutine in response to determining that the mobile computing device is receiving power from the external power source.
08/28/14
20140244160
Augmented reality financial institution branch locator
An augmented reality financial institution “fi”) branch locator uses the display screen of a mobile computing device (“mcd”) to show a customer that customer's real-world view of physical reality through the camera of the mcd on the mcd display screen (“camera image”), locations of fi branches for that customer's fi overlaid onto the camera image of the customer's physical location, locations of fi branches for competing fi's overlaid onto the same camera image, distances to the various fi branches overlaid onto the camera image, and directions to fi branches overlaid onto the camera image (together “augmented reality”) so that the user can navigate from the user's current location to a desired fi branch through the augmented reality image.. .
08/28/14
20140243046
Provisioning user attributes for use with mobile computing device
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
08/28/14
20140243014
Use of wireless access point id for position determination
A mobile computing device comprises a wireless transceiver and a processing circuit. The processing circuit is configured to identify a location, to identify a wireless access point within a predetermined distance of the location, to detect a wireless access point identifier using the wireless transceiver, to compare the detected wireless access point identifier to the identified wireless access point, and to initiate location determination based on the comparison..
08/28/14
20140242905
Provisioning user attributes for use with mobile computing device
A mobile computing device hosts an operating system and mobile applications. A provisioning application communicates with a secure element and near field communication (nfc) subsystem.
08/28/14
20140240756
Sending printjobs using trigger distances
In one example, a printer address for a network-connected printer, a printer location, and an identifier for a mobile computing device are received. Responsive to receiving a message that is sent to the printer address and that includes a print job, the print job is stored.
08/28/14
20140240689
Laser range finding attachment for mobile computing device
The present disclosure describes methods and systems, including computer-implemented methods, computer-readable media, and computer systems, for measuring range to an object (e.g., range finding) by reflection of laser radiation. One computer-implemented method includes the following operations executed on a mobile computing device (mcd): targeting an object with the mcd display operating as a viewfinder, receiving a request to trigger a laser range finding operation, initiating triggering of an emitter on a laser range finding attachment (lrfa) coupled to the mcd, receiving range finding data from the lrfa, processing the range finding data, and initiating display of data associated with the object, the data corresponding to the processed range finding data..
08/28/14
20140240527
Receptacle for an image capture computing device
An apparatus comprises a receptacle configured to receive a mobile computing device that has an integrated image capture component. Further, the apparatus comprises a plurality of handles such that each handle is operably connected to the receptacle.
08/21/14
20140237595
Apis for obtaining device-specific behavior classifier models from the cloud
The various aspects provide a system and methods implemented on the system for generating a behavior model on a server that includes features specific to a mobile computing device and the device's current state/configuration. In the various aspects, the mobile computing device may send information identifying itself, its features, and its current state to the server.
08/21/14
20140237385
System and method for providing notifications on a mobile computing device
A system and method for providing notifications on a mobile computing device are disclosed. The method comprises enabling multiple applications that operate on the mobile computing device to generate notifications in response to event occurrences.
08/21/14
20140237126
Sharing location information during a communication session
In one embodiment, a method includes establishing a communication session between a first device and a second device. The first device is a mobile computing device.
08/21/14
20140236669
Apparatus and method for identifying and employing visitation rates
Provided is a computer-implemented method that includes obtaining a user location dataset indicative of a location visited by a user, the user location dataset being based at least in part on a location signal received from a mobile computing device associated with the user, determining that the location visited corresponds to a geographic location of a place of interest, determining, using a computer, a visit count corresponding to the location dataset, adjusting a visit count for the place of interest to include the visit count corresponding to the location dataset, and storing the adjusted visit count for the place of interest in a visitation rate datastore.. .
08/21/14
20140236330
User device position indication for security and distributed race challenges
A mobile computing device includes a processor configured to receive position information from a position sensor and a display controlled by the processor. The device also includes a storage medium accessible to the processor and bearing instructions which, when executed by the processor, cause the processor to receive user input to challenge a friend's mobile device to an exercise, upload the challenge to a server, and receive a signal from the server indicating the challenge is accepted.
08/21/14
20140233545
Establishing secure connection between mobile computing device and wireless hub using security credentials obtained from remote security credential server
A mobile computing device includes a first wireless local area network adapter; a wireless wide area network adapter configured to connect to a remote security credential server across a wireless wide area network; an optical scanner or a near field radio communication adapter. The mobile computing device is configured to obtain information regarding security credentials from at least one of an optical scan of an optical tag and a near field radio communication exchange with a near field radio communication tag; obtain the security credentials from the remote security credential server across the wireless wide area network by providing the information regarding the security credentials to the remote security credential server which responds with the security credentials; and use the security credentials to establish a secure wireless network connection between the first wireless local area network adapter and a second wireless local area network adapter of a wireless hub..
08/21/14
20140232612
Multiple antenna system
A multiple antenna module suitable for use in small sized mobile computing devices includes at least a first antenna extending beyond a lateral edge of and coplanar with a printed circuit board assembly and connected to the printed circuit board assembly via a first antenna ground contact and a first antenna feed contact. The multiple antenna module also includes a second antenna located proximate to the first antenna and configured in a plane perpendicular to the plane continuing the first antenna and the printed circuit board.
08/21/14
20140232570
Vehicle location in weak location signal scenarios
A mobile computing device can be used to locate a vehicle parking location in weak location signal scenarios (e.g., weak, unreliable, or unavailable gps or other location technology). In particular, the mobile device can determine when a vehicle in which the mobile device is located has entered into a parked state.
08/21/14
20140232569
Automatic identification of vehicle location
A mobile computing device can be used to locate a vehicle parking location. In particular, the mobile device can automatically identify when a vehicle in which the mobile device is located has entered into a parked state.
08/21/14
20140232518
Systems and methods for an automated parking facility
Systems and methods for automated parking facilities are described herein. Users may purchase self-parking and/or valet parking with an access key.
08/14/14
20140230031
Secure configuration of mobile application
Secure configuration of a mobile application (“app”) includes sending the required configuration data for the app to the user's mobile computing device in a communication, for example an email with an attachment. A verification value is included in the attachment to protect the authenticity and integrity of the configuration data.


Popular terms: [SEARCH]

Mobile Computing topics: Mobile Computing, Mobile Computing Device, Computing Device, Augmented Reality, Smartphone, Tablet Computer, User Interface, Asset Management, Communications, Telematics, User Profile, Computer System, Transactions, Credit Card, Authentication

Follow us on Twitter
twitter icon@FreshPatents

###

This listing is a sample listing of patent applications related to Mobile Computing for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Mobile Computing with additional patents listed. Browse our RSS directory or Search for other possible listings.
     SHARE
  
         


FreshNews promo



0.2645

3993

2 - 1 - 72