This page is updated frequently with new Mobile Computing-related patent applications.
|Applications of secured memory areas and secure environments in policy-based access control systems for mobile computing devices|
Systems and methods are described for utilizing a secure environment on a mobile computing device for applying policy-based decision management in response to access requests from untrusted areas. A policy decision processor (pdp) within the secure environment provides a policy decision in response to an access query.
Sequitur Labs Inc.
|Methods circuits devices systems and functionally associated machine executable code for recommendation & distribution of digital content|
Disclosed is a content distribution system including a content server communicatively coupled to a data packet network and running one or more server-side components. A mobile computing device also communicatively coupled to the data packet network and running a client-side component may be configured to: (a) receive from said one or more server-side components a mobile device operational scenario definition; (b) activate or configure one or more monitoring routines in accordance with the device operational scenario definition; and (c) monitor said mobile computing device for an occurrence of the defined operating scenario using the activated or configured monitoring routines..
|Contextual peer based guidance systems and methods|
An embodiment includes a mobile computing device determining user profile elements and user goals for a user; determining user activity levels corresponding to the user goals; determining peer group activity levels corresponding to the user profile elements, user goals, and user activity levels; determining a peer group activity level exceeds a user activity level; sensing an environmental condition corresponding to the user's current environment; and communicating a message to the user, which corresponds to a peer group activity, based on (a) determining a peer group activity level exceeds a user activity level, and (b) the sensed environmental condition. Other embodiments are described herein..
|Wireless interface module for chemical dispensing system|
Methods, systems, and computer program products for wirelessly communicating with various system controllers of a facility through a wireless interface module. A mobile computing device may wirelessly connect with the wireless interface module to transmit information to and receive information from the wireless interface module.
Delaware Capital Formation, Inc.
|My personal identification mobile wallet|
This process and procedures system is the results of a night revelation. I have in my personal notes step by step of what i saw in the dream or a visual idea.
|Multiscreen secure content access|
Methods and systems for securely accessing content irrespective of the security of the environment in which the content is being accessed are described herein. In some embodiments, a mobile computing device may determine whether secure enterprise content is being accessed on a mobile computing device.
Citrix Systems, Inc.
|Mobile device support for sensors in peripherals|
Examples relate to extending hardware support for sensors embedded in peripherals. In some examples, a driver is used to determine that a peripheral device includes a sensor in response to the peripheral device being attached to a mobile computing device, where the driver is preloaded in an operating system kernel of the mobile computing device.
Hewlett-packard Development Company, L.p.
|System, enabling corneal topography mapping by smartphone|
An apparatus for enabling corneal topography includes an attachment to align a placido disc illumination system with a camera of a mobile communication device. The placido disc illumination system generates concentric rings and reflects the concentric rings off a cornea.
Smart Eyedeas I, Llc
|Systems and methods for autonomously generating photo summaries|
Implementations of the disclosed technology include techniques for autonomously collecting image data, and generating photo summaries based thereon. In some implementations, a plurality of images may be autonomously sampled from an available stream of image data.
|Automatic self-protection for a portable electronic device|
Provided are techniques for automatically protecting portable and wearable electronic devices from potential hazards by predicting when such hazards may occur. Techniques may include monitoring a plurality of sensors on the mobile computing device; receiving, on the mobile computing device, context data from a plurality of context-service applications; selecting a set of device-protection policies based upon an availability of the plurality of sensors and the plurality of context-service applications, wherein the set of device-protection policies are configured to determine a level of risk to the mobile computing device based on sensor data received from the plurality of sensors and the context data; applying the sensor data and the context data to the set of device-protection policies to generate the level of risk; and triggering a self-protection action if the level of risk exceeds a pre-determined threshold level of risk..
International Business Machines Corporation
Retail purchasing computer system and operating same
A retail purchasing computer system associated with a retailer is described herein. The retail purchasing computer system includes a retail server computer including a processor coupled to a memory device.
Wal-mart Stores, Inc.
Point-of-sale terminal that sets a special display flag in electronic receipt data
A point-of-sale terminal includes a customer code detecting unit, a control unit, and a communication unit. The control unit is configured to generate electronic receipt data that includes the customer code of a customer who is purchasing one or more products and data describing the products that are being purchased in a transaction, detect a condition for displaying an alert on a mobile computing device correlated to the customer code, and upon detecting the condition, set a flag in the electronic receipt data to indicate that the condition is met.
Toshiba Tec Kabushiki Kaisha
Workout pattern detection
Aspects of the technology described herein can analyze signal data from multiple computing devices to ascertain a user's exercise pattern. Understanding a user's exercise pattern can help reduce power usage by automatically turning physiological sensors on and off to coincide with the start and end of an exercise event.
Microsoft Technology Licensing, Llc
Branching mobile-device to system-namespace identifier mappings
Provided is a process of merging data from feeds from multiple sources of computing device network activity data having heterogenous device identifier namespaces and device identifier to device mappings that change over time, the process including: accessing three or more sources of network activity log data from three or more different sources of network activity data, wherein: for each of the sources of network activity log data, based the respective network activity log data, updating a multi-namespace mapping that maps the external-namespace device identifiers to internal-namespace device identifiers in an internal namespace of a system configured to profile mobile computing devices based on logged network activity data of the mobile computing devices, wherein: the namespace mapping comprises a plurality of external-namespace-specific mappings each mapping a respective type of device identifier in a respective external namespace used in the network activity log data to one or more internal-namespace device identifiers.. .
Automated audio volume based on physical motion estimation
The present disclosure involves a method for automating media audio volume based on the physical motion of a mobile computing device. In one embodiment, the method includes detecting motion of the mobile device based on input motion data from a motion detection mechanism, determining whether the detected motion of the mobile device exceeds a configured motion threshold, based on the determining, causing a logical state change to transition into a automated volume state, and after the logical state change to transition to the automated volume state, automatically configuring the audio volume of audio output provided by a mobile computing device based on configured volume and fade parameters..
Generating routing information for a target location
Aspects of the present invention disclose a method, computer program product, and system for generating routing information. The method includes one or more processors acquiring a current location for each of a plurality of mobile computing devices.
International Business Machines Corporation
Heading estimation for determining a user's location
Technologies for determining a user's location by a mobile computing device include detecting, based on sensed inertial characteristics of the mobile computing device, that a user of the mobile computing device has taken a physical step in a direction. The mobile computing device determines a directional heading of the mobile computing device in the direction and a variation of an orientation of the mobile computing device relative to a previous orientation of the mobile computing device at a previous physical step of the user based on the sensed inertial characteristics.
Device and system for the prevention of an individual operating a vehicle while impaired
The subject device and associated system relates generally to assessing impairment of an individual to determine whether to provide access to operate a motor vehicle, providing an ignition interlock that works without requiring modification in a motor vehicle and allowing an individual to start the vehicle only following measurement of blood alcohol content or following a series of cognitive tasks to determine the level of impairment. The systems and devices described herein relate incorporate a shielded case designed to disable communication between wireless car keys and the corresponding motor vehicles.
Mobile social activity networking systems and methods
A mobile social activity networking system configured for facilitating event planning and coordination of activities of users is provided. The system allows users to input user preferences on a mobile computing device via a social networking application on the mobile computing device; to form a group of users with preferred activities and geographic range of proximity to the group; and to select a location for the group of users.
Y R Tech, Llc
Inferring user availability for a communication
The technology described herein manages communications received by a mobile computing device by ascertaining a user's availability to receive an incoming communication. The technology described herein can optimize the use of notification resources on a computing device to provide notifications only when a user is available to respond to a communication the notification announces.
Microsoft Technology Licensing, Llc
Mobile computing terminal with more than one lock screen and using the same
A method and a system for displaying information and content in a lock screen system having a plurality of screens so as to provide a screen lock for preventing an unintended input of a user terminal device, and a computer-readable recording medium. The method includes setting information and content on a plurality of lock screen, displaying the plurality of lock screens, providing a screen movement between the plurality of lock screens, executing an existing external application so as to provide detailed information for the information and content displayed on the plurality of lock screens, unlocking the plurality of lock screens, and posting an advertisement on a part of the plurality of lock screens.
Network providing location targeted content to a mobile computing device
A network system for providing content to a mobile computing device of a user based upon the location of the mobile computing device. A wireless internet access point provides access to a single vendor web site such that upon connecting the wire-less internet access points to the user's mobile computing device, a processor determines whether the device is associated with a user and if so, said device is directed to the landing page of the vendor web site when the user mobile computing device's device location is within a predetermined proximity to the wireless internet access point of that vendor..
Non-networking connection with server computing device to at least power off the server computing device
A mobile computing device of a user transmits a digital certificate to a server computing device over a non-networking connection established with the server computing device. The digital certificate identifies the user, a particular server computing device, a validity period in which the digital certificate is valid, and a list of actions that the user is permitted to perform on the particular server computing device during the validity period.
Lenovo Enterprise Solutions (singapore) Pte. Ltd.
Messaging integration in connection with a transportation arrangement service
A computing device can execute a messaging application corresponding to a messaging service and display a user interface comprising a messaging thread between a user of the mobile computing device and at least a second user, the messaging thread including textual content corresponding to a location. The computing device can then receive a user selection of the textual content, and generate a selectable transport request feature on the display to overlay at least a portion of the messaging thread.
Uber Technologies, Inc.
Capturing physical inventory in a data center
Capturing physical inventory in a data center includes: establishing a proximity-based data communications connection with a service processor of a server, the server installed at a location within a server rack; retrieving an identifier of the server via the proximity-based data communications connection; capturing, with a camera of the mobile computing device, a digital image of the server in the server rack; identifying, from the digital image, the location of the server within the server rack; and storing the identified location of the server within the server rack in association with the retrieved identifier.. .
Lenovo Enterprise Solutions (singapore) Pte. Ltd.
Integrated mobile parking application and smart parking meter system
A mobile computing device executing software code interacts with a smart parking meter to permit the user to complete a parking transaction without the need to exit their car. The transaction proceeds digitally and confirmation of the purchase is sent to the user's smartphone or via other electronic message means.
Municipal Parking Services, Inc.
Multi-format calendar digitization
Technologies for digitizing a physical version of a calendar include a mobile computing device. The mobile computing device receives a source image representative of a physical version of a calendar.