This page is updated frequently with new Mobile Computing-related patent applications.
| Substantially continuous location logging for geographic-positioning capable devices|
In one embodiment, a mobile computing device has a first processor and a second processor. The mobile device determines an operating condition of the mobile device, the operating condition being based on at least the current time of day, a current activity of a user associated with the mobile device, or a current proximity of the mobile device to a place connected to the user of the mobile device through an on-line social network.
| System and superimposing spatially correlated data over live real-world images|
Systems, methods, and other embodiments are disclosed that augment a visually displayed portion of a facility with superimposed virtual elements. In one embodiment, mobile position data is generated based on non-optical sensor readings taken by a mobile computing device.
Oracle International Corporation
| Method and system for identifying potentially successful dating relationship|
A method for identifying people who are potentially to have a successful dating relationship including embedding an application within a mobile computing device, having at least a first user and a second user to sign in into each's respective mobile device application to initiate a session; allowing the application to generate a question to the first user and the second user; deciding either the first user or the second user is in command mode; answering the question with response to each other by the first user and the second user; allowing the first user or the second user in command mode to decide if the received response is satisfactory; moving the first user or the second user forward or backward from an end point depending on whether the response is satisfactory.. .
| Local personal daemon|
Systems and methods of a personal daemon, executing as a background process on a mobile computing device, for providing personal assistant to an associated user is presented. While the personal daemon maintains personal information corresponding to the associated user, the personal daemon is configured to not share the personal information of the associated user with any other entity other than the associated user except under conditions of rules established by the associated user.
Microsoft Technology Licensing, Llc
| Apparatus and profiling users|
Provided is a process of profiling a user of a mobile computing device, the process including: obtaining a location history of a user, the location history being based on signals from a mobile computing device of the user; obtaining a location-attribute score of a location identified in, or inferred from, the location history; determining, with a computer, a user-attribute score based on the location-attribute score; and storing the user-attribute score in a user-profile datastore.. .
|Location-based buffer management systems and methods|
An exemplary method includes a buffer management system tracking a geographic location of a mobile computing device while the mobile computing device receives streaming content by way of a network; determining, based on the tracked geographic location, that the mobile computing device is approaching a geographic area designated as having a network connectivity level that is below a predetermined threshold; and dynamically increasing, in response to determining that the mobile computing device is approaching the geographic area and based on the tracked geographic location of the mobile computing device, a size of a buffer maintained by the mobile computing device and used to present the streaming content by way of the mobile computing device. Corresponding systems and methods are also described..
Verizon Patent And Licensing Inc.
|Application launching in conjunction with an accessory|
An application can be launched in response to a launch request from an accessory. For example, the mobile computing device can determine whether it is in a state that allows launching of an application and/or can determine whether the application or application type requested in the launch command is available for launching.
|Public transit vehicle route schedule and notification system|
In an embodiment, a route schedule and notification system which includes a computer-implemented method in a mobile computing device is for collecting route context from a plurality of passengers along a roadway, transmitting the route context to a route context analytics server, providing an estimation of vehicle arrived to a target vehicle stop, generating an estimated arrival time notification for passenger to plan the schedule to wait for a vehicle arrival. Also, an embodiment, a route schedule and notification system which includes a computer-implemented method in the route context analytics server is for analysing, predicting or estimating the vehicle arrival and departure time, calculating the travel time of vehicle on the road, determining an alternative route to reach the destination, generating the real arrival time notification for passenger to plan the schedule to wait for a vehicle arrival..
|System, confirming fixture/display assembly and/or compliance|
Disclosed herein are systems, methods and apparatus for confirming fixture/display assembly and/or compliance. In some forms, systems, methods, and apparatus are disclosed for assessing the accuracy of fixture and display assemblies or setups and/or confirming compliance of fixtures and displays at specific periods of time.
Dci Marketing, Inc.
|Wearable retina/iris scan authentication system|
A wearable retina/iris authentication system includes: a frame; a retina/iris scanner mounted to the frame for capturing images of a retina and/or an iris of a user; a mobile computing device, the mobile computing device including a memory for storing information about the user; a position determining device coupled to the mobile computing device for continuously determining a location of the user and providing the location to the mobile computing device; a display mounted to the frame and coupled to the mobile computing device for displaying information received from the mobile computing device; a database for storing information about one or more of a plurality of retina images and a plurality of iris images for matching with the captured images of one or more of the retina and the iris of the user; and a communication interface for comminuting with external systems remote to the wearable system.. .
Systems and methods to facilitate submission of user images descriptive of locations
Systems and methods to facilitate the submission of user images that are descriptive of a location or point of interest are provided. One example computer-implemented method includes determining a location at which a first image was captured by a mobile computing device.
Time-based installation and uninstallation of applications
Aspects of the present invention disclose a method, computer program product, and system for managing applications on a computing device. The method includes one or more processors receiving a user utilizing a scheduling function of a computing device to schedule a time to uninstall an application from the computing device.
International Business Machines Corporation
Automated security system for schools and other structures
Disclosed are various embodiments for security systems for schools and similar structures. Various security devices may be monitored in a structure, such as a school, where at least one of the security devices includes a wall-mounted duress alarm, an electronic keypad, a radio-frequency identification (rfid) reader, a card access reader, a decibel meter, a smoke detector, or a mobile computing device.
Method for providing health therapeutic interventions to a user
A method and system for digitally providing healthcare to a patient, the method including receiving a log of use dataset associated with patient digital communication behavior at a mobile computing device, wherein the first log of use dataset corresponds to a time period; receiving a supplementary dataset corresponding to the time period; receiving a survey response dataset from the patient, the survey response dataset corresponding to the time period; receiving a care provider dataset in association with the time period; selecting a therapeutic intervention from a set of therapeutic interventions, based on processing with at least one of the first log of use dataset, the supplementary dataset, the survey response dataset, and the care provider dataset; generating a dynamic care plan modifiable over a time period; promoting the therapeutic intervention according to the dynamic care plan.. .
System and printing
Systems, methods, and computer-readable media are provided. Some embodiments include maintaining, at a mobile computing device, a record associated with a print job submitted to a first printing device, the record including information for locating the first printing device and information that identifies the print job.
Canon U.s.a., Inc.
Method and system for modeling behavior and heart disease state
A method for evaluating cardiovascular health of a patient includes receiving a log of use dataset associated with patient digital communication behavior at a mobile computing device, wherein the log of use dataset is associated with a time period, receiving a supplementary dataset associated with the time period, generating a survey dataset based on a patient response to a survey, generating a cardiovascular health predictive model based upon at least one of the log of use dataset, the supplementary dataset, and the survey dataset, extracting a cardiovascular health metric from at least one of an output of the cardiovascular health predictive model, the log of use dataset, the supplementary dataset, and the survey dataset, wherein the cardiovascular health metric is associated with the time period; providing a cardiovascular-related notification to the patient; and automatically providing a cardiovascular therapeutic intervention at a cardiovascular device for the patient.. .
Technologies for localized audio enhancement of a three-dimensional video
Technologies for localized audio enhancement of a three-dimensional video include capturing a three-dimensional video including depth data using a three-dimensional camera of a mobile computing device and receiving a three-dimensional audio associated with the three-dimensional video using a microphone array. A user may enhance localized audio by selecting a region of the three-dimensional image from the three-dimensional video.
Method and system for replicating a communication application on an auxiliary computing device
According to embodiments described in the specification, a method and system for replicating an application on an auxiliary computing device are provided. The system includes the auxiliary computing device, a mobile computing device executing the application, and at least one server.
Kik Interactive Inc.
System and assessing vulnerability of a mobile device
A system and method for assessing vulnerability of a mobile device including at a remote analysis cloud service, receiving at least one vulnerability assessment request that includes an object identifier for an operative object of a mobile computing device, wherein the vulnerability assessment request originates from the mobile computing device; identifying a vulnerability assessment associated with the identifier of the operative object; and communicating the identified vulnerability assessment to the mobile computing device.. .
Duo Security, Inc.
Data loss prevention for mobile computing devices
System calls to a kernel of a mobile computing device are monitored. A particular system call is intercepted relating to input/output (i/o) functionality of the mobile computing device.
Securedinter-application communication in mobile devices
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (id) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network.. .
Mobile hardware for automated response to distress signal
A system for facilitating automated response to a distress signal includes an attachment for a multifunction mobile computing device. In some embodiments, the attachment removably articulates to a sensor location coupled to a housing of the multifunction mobile computing device.
Alert Media, Inc.
Tracking mobile app installations
In an embodiment, a data processing method comprises receiving, at a mobile computing device, a request comprising a protocol identifier, a label value, and a data value, wherein the protocol identifier is associated with a protocol implemented in a first mobile app; using a protocol handler in the mobile computing device associated with the protocol, initiating processing of the request; using a native code element in the mobile computing device: intercepting the request when the label value matches a particular expression, and in response to the intercepting, providing the data value to other than the first mobile app, the protocol handler or the native code element; wherein the method is performed by one or more computing devices.. .
Providing location-based feedback services
Facilitating rendering of a digital gratuity, with or without an associated value, to a service worker by a customer. A communication device associated with a geographical area and at least one service worker can be detected by a mobile computing device associated with a customer.
Masking sensitive data in mobile applications
In an approach to masking data in a software application associated with a mobile computing device, one or more computer processors receive a request to display data in a software application on a mobile computing device. The one or more computer processors determine whether one or more masking rules apply to the data, where determining whether one or more masking rules apply to the data is performed by an instrumentation of application binary of the software application.
International Business Machines Corporation
Technologies for depth-based user authentication
Technologies for depth-based user authentication include a mobile computing device to display a login image including a depth channel on a display of the mobile computing device. The mobile computing device determines a selection of a plurality of objects of the login image made by a user of the mobile computing device, generates a user-selected password based on a relative depth of each object of the plurality of objects selected by the user, and permits access to the mobile computing device in response to a determination that the user-selected password matches a device login password..
Integration of force tranducer into tablet to measure weight
Methods and apparatus relating to integration of force transducer into a mobile computing device to measure weight are described. In an embodiment, logic receives a load detection signal from one or more load sensors coupled to the mobile computing device.