Patent application number | Description | Published |
20140250027 | Tracking information display systems and related methods - A tracking information display system is described. The tracking information system detects a tracking number on a webpage and displays tracking information associated with the tracking number, regardless of which common carrier may be associated with the tracking number. | 09-04-2014 |
20140258164 | SHIPPING PREFERENCES POPULATION SYSTEMS AND RELATED METHODS - The present systems and methods describe a computer system that collects user shipping preferences, including, for example, the shipping speeds (e.g., standard three to five day shipping) a user selects on various retailer websites. The system is configured to determine the one or more preferred shipping methods for the user based on the collected shipping preferences and to save the preferred shipping methods to memory (e.g., the user commonly prefers standard shipping). When the user visits an online retailer, the system, detects a shipping field (e.g., where the user may select or input a shipping preference), accesses the saved preferred shipping method (e.g., the user prefers standard shipping), and populates the shipping field with the saved preferred shipping method (e.g., the system automatically selects “standard shipping” for the user). | 09-11-2014 |
20140258424 | MESSAGING SYSTEMS AND RELATED METHODS - A system and method for allowing a purchaser of a gift to associate a personal message (e.g., an audio and/or video message) with the gift is described. The personal message may be associated with the gift via a unique identifier associated with a parcel (e.g., a parcel tracking number) in which the gift is shipped to the intended recipient of the gift. Once the gift is received by the gift recipient, the gift recipient may also associate a message with the gift via the unique identifier. The gift recipient's message may be in response to the purchaser's message, an unrelated message to the purchaser, a message to the retailer where the gift was purchased, or a message to a common carrier. | 09-11-2014 |
20140278875 | GROUP BUYING SYSTEMS AND RELATED METHODS - Various embodiments of group buying systems are described. The system enables users to form groups and designate a common delivery/pickup location (e.g., a single home or office), where group members may have their packages delivered. The system also may be configured to suggest that group members make group purchases (e.g., some or all group members by the same or similar items) and may facilitate of aggregation of packages for delivery to the designated common delivery/pickup location. | 09-18-2014 |
20140278964 | POST-CHECKOUT OFFER SYSTEMS AND RELATED METHODS - A system for creating and providing custom post-checkout out offers to a user is described. The system collects purchase history data and social network data associated with the user to create custom post-checkout offers for the user, which are provided to the user immediately after the user makes a purchase. The post-checkout offers may also be customized based on the products and/or services that were just purchased by the user. | 09-18-2014 |
20140279205 | DATE REMINDER SYSTEMS AND RELATED METHODS - A computer system for providing date reminders and gift recommendations is disclosed. The system receives event, purchase history, and social network data associated with a gift recipient (e.g., a first user). Based on the social network data, the system determines that the gift recipient is connected to a notification recipient (e.g., a second user) on a social network (e.g., the gift recipient and the notification recipient are “friends” on Facebook® or “connected” on) LinkedIN®. The system sends a notification to the notification recipient (e.g., via the social network) of a special event (e.g., a birthday) of the gift recipient based on the event data and also recommends gifts for the gift recipient based, at least in part, on the purchase history data. | 09-18-2014 |
20140279286 | PORTABLE ADDRESS BOOK SYSTEMS AND RELATED METHODS - A portable, electronic address book is described. The address book enables the user to select various addresses from the address book, which are used to fill in address fields on webpages. The address book collects address information from various sources, including webpages (e.g., when a user fills in an address when making an online purchase) and social networks (e.g., from the user's social network profile) to be used to fill in address fields. | 09-18-2014 |
20140279655 | PURCHASE HISTORY SYSTEMS AND RELATED METHODS - A computer system for providing a user purchase history is disclosed. The computer system receives purchasing and shipping data associated with a user regardless of where the user made a purchase or how the items associated with the purchase were shipped. The system then stores the purchasing and shipping data and enables a user to access the received data in one convenient location via a username and password. In various embodiments, the system also enables the user to print shipping labels and/or the system facilities the return of purchased items. | 09-18-2014 |
20140279656 | MULTI-CARRIER TRACKING SYSTEMS AND RELATED METHODS - A system for providing individuals with comprehensive shipping and online purchasing information is disclosed. The system receives online purchasing and shipping information associated with purchases, regardless of where an individual made the purchase (e.g., from any website), what items were purchased, and what carrier shipped the purchased items. The purchasing and shipping information is made available to the individual through an account and associated login. This allows individuals to conveniently view all shipping information and a detailed record of all online purchases in one location. | 09-18-2014 |
20140280002 | SEARCH RESULTS ENHANCEMENT SYSTEMS AND RELATED METHODS - A system and method for enhancing search results is described. The system receives information and data about retailers and social network data about a user. The system then detects search terms input by the user into a search field (e.g., on a search webpage) and modifies the search terms at least partially based on the information associated with the various retailers and the social network data. The system (or the user) then submits the modified search terms to a search engine and receives search results based on the modified search terms. | 09-18-2014 |
20140280119 | SEARCH RESULTS MODIFICATION SYSTEMS AND RELATED METHODS - A system and method for highlighting particular search results is described. The system receives information and data about retailers and users. The system then receives notice that a user has performed an Internet search (e.g., using a search engine), receives the search results from the Internet search, and modifies the search results at least partially based on the information associated with the various retailers and social network data. The system may provide special offers to the user, highlight specific retailers, and/or add new results customized for the user (e.g., based on the social network and/or other data). | 09-18-2014 |
20150294262 | DETERMINING DELIVERY WINDOWS FOR ITEM DELIVERY BASED ON CUSTOMER AND/OR ITEM LOCATION - Systems, methods, apparatus, and computer program products are provided for programmatically determining/identifying one or more delivery windows in which an item is available to be delivered and allowing customer selection of one of the delivery windows. One example embodiment may include a method comprising receiving customer location information indicative of a customer location and determining one or more time frames from a plurality of time frames in which delivery of the item is available based on the customer location. The method may also comprise allowing an authenticated customer access to each of one or more features of a carrier system via login information/data associated with the retailer system. | 10-15-2015 |
Patent application number | Description | Published |
20110099316 | Dock-Specific Display Modes - In general, the subject matter described in this specification can be embodied in methods, systems, and program products. A mobile computing device is determined to have electrically coupled by physical contact with a docking system that is adapted to supply electrical power for charging the mobile computing device. The docking system is determined to be a first type of docking system from a plurality of types of docking systems. A first user interface profile that corresponds to the first type of docking system is selected from among a plurality of user interface profiles. Each of the plurality of user interface profiles corresponds to a respective type of docking system from the plurality of types of docking systems. The first user interface profile is presented by the mobile computing device in response to selection of the first user interface profile. | 04-28-2011 |
20110131358 | Wireless Communication with a Dock - In general, the subject matter described in this specification can be embodied in methods, system and program products. A mobile computing device determines that the mobile computing device has physically paired with a docking system. Wireless communication between the mobile computing device and the docking system is automatically established in response to said determining that the mobile computing device has physically paired with the docking system. Data that encodes an audio signal is transmitted, by the mobile computing device and to the docking system as part of the wireless communication, so as to cause speakers of the docking system to audibly output the audio signal from the mobile computing device. | 06-02-2011 |
20120023463 | DOCK-SPECIFIC DISPLAY MODES - In general, the subject matter described in this specification can be embodied in methods, systems, and program products. A mobile computing device is determined to have electrically coupled by physical contact with a docking system that is adapted to supply electrical power for charging the mobile computing device. The docking system is determined to be a first type of docking system from a plurality of types of docking systems. A first user interface profile that corresponds to the first type of docking system is selected from among a plurality of user interface profiles. Each of the plurality of user interface profiles corresponds to a respective type of docking system from the plurality of types of docking systems. The first user interface profile is presented by the mobile computing device in response to selection of the first user interface profile. | 01-26-2012 |
20120030393 | Wireless Communication with a Dock - In general, the subject matter described in this specification can be embodied in methods, system and program products. A mobile computing device determines that the mobile computing device has physically paired with a docking system. Wireless communication between the mobile computing device and the docking system is automatically established in response to said determining that the mobile computing device has physically paired with the docking system. Data that encodes an audio signal is transmitted, by the mobile computing device and to the docking system as part of the wireless communication, so as to cause speakers of the docking system to audibly output the audio signal from the mobile computing device. | 02-02-2012 |
20120303851 | Establishing Wireless Communication Between a Mobile Computing Device and a Docking System - In general, the subject matter described in this specification can be embodied in methods, systems, and program products. A mobile computing device that is physically contacting a docking system receives one or more electrical signals via a physical electrical connection between the mobile computing device and the docking system. The mobile computing device identifies, based on the received one or more electrical signals, a type of the docking system. The mobile computing device determines, based on having identified the type of the docking system, that a setting for automatically establishing wireless communication between the mobile computing device and the docking system is activated. The mobile computing device establishes, as a result of determining that the setting is activated, the wireless communication between the mobile computing device and the docking system. | 11-29-2012 |
20140013240 | CREATING SOCIAL GROUP EVENTS - Systems and methods for creating a social group event are provided. User interactions corresponding to two users are received and at least one common interest between the two users is identified from the received user interactions. A determination is made as to whether there is a relationship between the two users. When it is determined that there is a relationship, a social group event is suggested for the two users based on the identified at least one common interest with at least one of a specified time or a specified location based on the received user interactions. | 01-09-2014 |
20140095304 | Providing Notifications for Redeeming Offers Based on External Signals - A system and methods for automatically generating and providing notifications with suggestions of unredeemed offers to users who have acquired them, based on external signals that are generated by determining user interests, for example, user intentions, user actions, or significant events relating to users. The user interests may be determined from multiple sources for example, emails, calendars, locations, searches, social network streams, social graphs, etc. This technology searches through unredeemed offers associated with users and co-relates them with user interests to identify unredeemed offers that may be appropriate to the user interests and generates notifications suggesting the appropriate unredeemed offers before they expire. The notifications may be provided to users via email, instant messaging, social streams, SMS/MMS messages, telephone calls, among other methods for electronic communication. | 04-03-2014 |
20140101123 | CUSTOM EVENT AND ATTRACTION SUGGESTIONS - A computing device may determine a geographic location of the computing device. The computing device may receive information associated with a user. The information may include a search history, a browsing history, an electronic communication message, a social media profile, and a geographic location history. The computing device may determine, based on the information associated with the user, a predicted interest of the user. The computing device may determine, based on the predicted interest of the user, events within a threshold distance from the geographic location of the computing device. The computing device may determine, based on a strength of a relationship between the predicted interest and respective event information associated with each of the events, a ranking of the events. The computing device may output, based on the ranking, at least a portion of the event information for at least one of the events. | 04-10-2014 |
20140258564 | Methodology for Detecting Problematic Connections with Peripheral Devices - Implementations of the present disclosure provide methods and systems for identifying peripheral devices with which problematic connections have been established. According to one embodiment, a method for detecting a model of peripheral device for which problematic connections with a computerized unit are common is disclosed. The method involves receiving values of each of one or more features of a particular connection between a computerized unit and a peripheral device, using the received values to determine a score for each of the features of the particular connection, calculating an overall connection score from the scores for each of the features, and generating a problematic peripheral device report including the model of the peripheral device if the overall connection score is indicative of a problematic connection. | 09-11-2014 |
20140379811 | INTERACTIVE MULTI-TASKER - The disclosure is directed to an interactive multi-tasker for casting applications executing on a first computing device of a user on any of multiple computing devices of the user from any of the computing devices. Each of the computing devices presents a unified view of tasks and applications executing on each of the computing devices through the multi-tasker. The user can perform multiple actions on the tasks and applications, e.g., cast using a first device an instance of an application that is executing on a second device on to a third device. The state data is synchronized from the second device to the third device. Another instance of the application resumes execution on the third device using the synchronized state data. Once cast, each of the instances of the application executes independently of each other. | 12-25-2014 |
20150032889 | MULTI-TASKER - The disclosure is directed to presenting a unified view of tasks and applications across multiple computing devices of a user. A unified view of the tasks can be presented using a task manager. The task manager presents a list of tasks that are executing at each of the devices. The user can perform multiple actions on the tasks, e.g., launch on a first device a task executing on a second device from the first device, or terminate from the first device a task that is executing on the second device. A unified view of the applications can be presented using an app tray. The app tray displays a list of apps installed on each of the devices of the user. In displaying the list on a particular device, the app tray displays the apps that are not installed on the particular device in a distinct format, e.g., as shadow icons. | 01-29-2015 |
20150052238 | Device Compatibility Management - Methods and systems for automatically providing a notification of an operational problem between two devices are provided. The method may include searching online content for user feedback comments associated with a first device and a second device. Sentiment analysis may be performed for the user feedback comments and ian operational problem that occurs between the first device and the second device may be identified based on the sentiment analysis. Next, a notification of the operational problem may be provided. Additionally, a probable cause associated with the operational problem may be identified and a suggested solution based on the identified probable cause may be provided. The suggested solution may correct the operational problem between the first device and the second device. | 02-19-2015 |
20150065161 | Sending Geofence-Related Heuristics to Multiple Separate Hardware Components of Mobile Devices - Methods and apparatus are directed to geofencing-related heuristics for computing devices. A computing device with a plurality of sensors can receive a plurality of heuristics. Each heuristic can be configured to generate command(s) for the sensors based on one or more heuristic inputs. The heuristic input(s) can include an input related to a geofence. The computing device can receive a plurality of signals from the sensors. The computing device can determine, based on the plurality of signals, an activity class for the computing device. The activity class can specify an activity associated with the computing device. The computing device can select a heuristic from the plurality of heuristics at least based on the activity class. The computing device can execute the selected heuristic to generate the command(s) for the sensors. | 03-05-2015 |
20150200906 | MANAGING PENDING ELECTRONIC MESSAGE RESPONSES - A computer-implemented method for managing pending electronic message responses is provided. The method includes accessing, using a processor, information for determining whether a response is expected for a pending electronic message, and analyzing the pending electronic message based on the accessed information to determine that a response to the pending electronic message is expected from a recipient of the electronic message. The method also includes providing the pending electronic message to the recipient, and monitoring for the response to the pending electronic message, by monitoring incoming electronic messages to determine if the response to the pending electronic message is received. The method further includes, if no response is received within a predetermined period of time, providing for notifying a sender of the pending electronic message. Systems and machine-readable media are also provided. | 07-16-2015 |
20150326655 | IN-APP APPLICATION CASTING - The subject disclosure relates to systems and methods for casting an application from a source device to a destination device. In particular, a process can include steps for causing a source application executing as a foreground process in an operating system of a source computing device to store state data, transmitting the state data of the source application to a set of destination computing devices, and transmitting a cast command to the destination computing device, where the cast command is configured to instruct the destination computing device to execute the source application on the destination computing device using the state data. | 11-12-2015 |
Patent application number | Description | Published |
20090288079 | AUTOMATIC INSTALLATION OF A SOFTWARE PRODUCT ON A DEVICE - Methods, systems, and apparatus, including medium-encoded computer program products, for installing software include receiving a request to install a software product on a device and identifying the software product and the source of the software product based on the request. A message, which includes data identifying the software product and the source of the software product, is transmitted to a remote update device. An authorization message is received from the remote update device indicating whether the source of the software product is authorized to provide the software product. If the authorization message indicates that the source of the software product is authorized to provide the software product, the software product is automatically installed on the device. | 11-19-2009 |
20100107251 | MIME Handling Security Enforcement - A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine. | 04-29-2010 |
20100192165 | ASCERTAINING DOMAIN CONTEXTS - Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision. | 07-29-2010 |
20120131636 | Security Context Lockdown - A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down. | 05-24-2012 |
20140150119 | Security Restrictions on Binary Behaviors - A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access. | 05-29-2014 |
20140150121 | MIME Handling Security Enforcement - A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine | 05-29-2014 |
20140157360 | Security Context Lockdown - A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down. | 06-05-2014 |
20150193215 | Common installer server - Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest. | 07-09-2015 |
Patent application number | Description | Published |
20120275321 | APPARATUS AND METHOD FOR ARBITRATION OF UPDATES PROVIDED TO A UNIVERSAL INTEGRATED CIRCUIT CARD - Systems and methodologies are described that determine whether to communicate an update message to a UICC. A UE may be equipped a status update message from at least one of a first radio access technology (RAT) module supporting a first RAT and a second RAT module supporting a second RAT. The first RAT and the second RAT are different. Further, the UE may be equipped to determine whether to generate a universal integrated circuit card (UICC) update message to update a UICC by applying one or more RAT arbitration factors to the received status update message. The UICC includes current UICC status information associated with a current RAT. A status update message may include, a service status, RAT information, and location information, and the UE may apply the RAT arbitration factors to at least a portion of the status update message. | 11-01-2012 |
20130039241 | METHOD AND APPARATUS FOR POWER MANAGEMENT OF UICC - The present disclosure describes a method for saving power in a user equipment (UE), which includes discovering at least one available access technology radio access network (RAN) having at least one access technology type, switching off power to a removable Universal Integrated Circuit Card (UICC) having subscription information for a second technology type different from a first technology type when a first technology type RAN is the only access technology RAN available, and establishing access to first technology type RAN user subscription information in a nonvolatile memory (NV) on the UE when a first technology type RAN is the only access technology RAN available. | 02-14-2013 |
20130311248 | METHODS AND APPARATUS FOR INCENTIVIZING ACTIONS ASSOCIATED WITH USE OF A NFC BASED PAYMENT FORM - Aspects disclosed herein relate to providing an incentive structure associated with various actions that are tied to access and/or use of a NFC based payment form. In one example, a NFC device may be configured to determine that a usage value for a NFC device is within a threshold value of a NFC account ceiling value. The NFC device may be further configured to provide a user with one or more actions to perform and information indicating how each of the one or more actions will affect the NFC account ceiling value. | 11-21-2013 |
20130336374 | SYSTEM SELECTION AND DETERMINATION THROUGH A SMART STORAGE DEVICE - A method, an apparatus, and a computer program product for wireless communication are provided in which system selection and system determination algorithms maintained in a smart storage device are used by a modem of a mobile wireless terminal. The smart storage device may provide configuration data and algorithms to be used by the modem and functions ordinarily performed by the modem may be performed by a processor of the smart storage device. The functions may include system determination, system configuration and system selection functions. The smart storage device may receive network information from the modem for use in performing the functions. The smart storage device permits preferences and policies set by a home network operator to override preferences and policies set by an operator of a network to which the wireless terminal is currently connected. | 12-19-2013 |
20130344857 | Subscriber Identity Module Activation During Active Data Call - Methods and systems are disclosed that provide refresh procedure to ensure successful subscriber identity module activation during active data and voice calls. A request to update a subscription data on a network application housed on a Universal Integrated Circuit Card (UICC) is processed by a mobile equipment (ME) and is forwarded to the UICC smart card. The UICC smart card updates the requested parameters on the network application and probes the ME to read the updated parameters. The ME polls its services to check if the network application can be refreshed. If the network application was not previously activated, the voting mechanism on refresh procedure is skipped and the ME proceeds with refreshing the network application for updating its copy of the subscription information. | 12-26-2013 |
20140051379 | METHODS, SYSTEMS AND DEVICES FOR PRIORITIZING ACCESS TO WIRELESS NETWORKS - Methods, devices and systems enable prioritizing mobile device access to a communication network during periods of reduced network availability, such as during emergency situations. The mobile device may be configured to detect the existence of an emergency situation locally, on the mobile device. Upon recognizing an emergency situation the mobile device may collect information from various components and/or sensors of the mobile device. Using the collected information, the mobile device may compute a priority for accessing the communication network. Using the computed priority, the mobile device may attempt to access the communication network in a manner that staggers access attempts among all mobile devices to reduce network congestion. | 02-20-2014 |
20140066120 | APPARATUS AND METHOD WITH ROUTING LOGIC FOR COMMUNICATIONS BETWEEN MULTIPLE BASEBAND MODEMS AND A UNIVERSAL INTEGRATED CIRCUIT CARD - Aspects of the present disclosure are directed to a user equipment having a universal integrated circuit card (UICC), multiple baseband modems, and routing logic for handling communications between the UICC and the baseband modems, and methods for operating the user equipment in which the routing logic arbitrates communication between the UICC and the baseband modems in accordance with arbitration logic. Other aspects, embodiments, and features are also claimed and described. | 03-06-2014 |
20140141760 | SYSTEMS, APPARATUS, AND METHODS FOR MANAGING INFORMATION IN A SMART STORAGE DEVICE - This disclosure provides systems, methods, and apparatus for refreshing information stored on a smart storage device. In one aspect a smart storage device is provided that is configured to be coupled to a wireless communications apparatus operating in a wireless communications network. The smart storage device includes a memory configured to store network access information for accessing services of the network. The smart storage device further includes a controller configured to send a message to the wireless communications apparatus including data notifying the wireless communications apparatus of an update to the network access information. The data further includes a command that the wireless communications apparatus suspend an active operation of the wireless communications apparatus and initiate updating information managed by the wireless communications apparatus based on one or more conditions. The updating of the information is based on at least a portion of the updated network access information. Other aspects, embodiments, and features are also claimed and described. | 05-22-2014 |
20140160307 | IMAGE CAPTURE DEVICE IN A NETWORKED ENVIRONMENT - Described herein are methods and devices that employ wireless network to control the lighting of a target image scene or subject. As described, connected environments enable control of lighting devices within the environment through the use of a network. Some embodiments of the imaging devices described herein may employ the network to control lighting devices for the purpose of illuminating a target scene or subject. Certain embodiments may employ data regarding camera location, subject location, light bulb location, and the parameters of each light bulb in a room to calculate desired lighting parameters for capturing an image of the subject, and may further be able to wirelessly adjust the light bulb parameters to match the calculated parameters. | 06-12-2014 |
20140168262 | User Interface for Augmented Reality Enabled Devices - Method and apparatus for displaying augmented reality contents are disclosed. The method may include controlling a camera to scan an environment in view of a user, identifying a set of surfaces in the environment for displaying user interface windows according to characteristics of the environment, prioritizing a set of augmented reality contents for display with respect to the set of surfaces in the environment, and displaying the set of augmented reality contents on the set of surfaces in a display. Characteristics of the environment comprise at least aspect ratio of the set of surfaces with respect to the set of augmented reality contents to be displayed, and/or background color of the set of surfaces with respect to the set of augmented reality contents to be displayed. | 06-19-2014 |
20140208387 | Device utilizing an optical signal to access an access point - Disclosed is a device that receives an optical signal having an authorization code that allows the device to utilize an access point to obtain access to the Internet and other networks. The device may include: a modem; a light sensor; and a processor. The light sensor may receive an optical signal from a light source. The processor may execute operations including: processing the received optical signal to identify an authorization code and to connect the device through the modem to the access point based upon the authorization code such that the device may obtain access to the Internet and other networks. | 07-24-2014 |
20140220949 | APPARATUS AND METHOD FOR OPTIMAL SCHEDULING OF ENVELOPE UPDATES TO SIM CARD - Aspects of the present disclosure are directed to an apparatus and methods that may improve scheduling of envelope updates to a SIM. An apparatus for wireless communication is configured to receive a plurality of updates in one or more envelope commands, categorize the updates into a plurality of groups having respective priorities, and send the updates to a SIM at the apparatus in order according to the respective priorities. Other aspects, embodiments, and features are also claimed and described. | 08-07-2014 |
20140269495 | SELECTING A NETWORK FOR A WIRELESS DEVICE - Disclosed is an apparatus, system, and method for a wireless device to select a network. The wireless device receives a request from a user to access a network site. The wireless device then selects a network based upon a predefined weighted criteria setting that was previously selected by the user. | 09-18-2014 |
20150019320 | SYSTEM AND METHOD FOR DETERMINING A DEFAULT ACCOUNT IN A MOBILE WALLET WHILE PROVIDING AN INCENTIVE TO ESTABLISH A DEFAULT ACCOUNT IN THE MOBILE WALLET - A method and system for determining a default account in a mobile wallet of a portable computing device while providing an incentive to establish a default account in the mobile wallet includes receiving a confirmation that the mobile wallet exists in the portable computing device, such as a mobile phone. Communications may be established with the mobile wallet over a communications network so that it can be determined which financial account in the mobile wallet is the default account. Subsequently, a reward may be transmitted over the communications network if a default account matches an account of a financial service provider that is trying to determine their financial account in the mobile wallet is the default account. According to one embodiment, determining which financial account in the mobile wallet is the default account may include transmitting a request for a payment over the communications network to the portable computing device. | 01-15-2015 |
20150067017 | METHOD AND SYSTEM FOR ACCESSING MEDIA - Methods and systems may facilitate access to media. A mobile computing device may manage media associated with links by evaluating factors that may affect battery life. The mobile computing device may obtain information about the media associated with the links, such as metadata indicating file characteristics, identifying information, and analytics. The information may be included in the media or obtained from a server. The mobile computing device may evaluate factors that affect the device's ability to receive and render the media. Such factors may include the battery charge state, signal strength, connectivity, or media characteristics (e.g., size, complexity, etc.). The mobile computing device may prioritize the links associated with the media based on the evaluation of the factors, such as by sorting the links by rank. The mobile computing device may also hide links, display warnings/indicators, display links in particular manners or formats, and automatically download the media. | 03-05-2015 |
20150120442 | SYSTEMS AND METHODS FOR MOBILE ADVERTISING ON MULTI-SIM DEVICES - Systems and methods are disclosed for managing mobile advertisement in a smartphone that has multiple Subscriber Identification Module (SIM) capability to more effectively and more efficiently target mobile ads to smartphone users. Multi-SIM-capable devices such as DSDA devices have two subscriptions (e.g., two phone numbers) to one or more mobile telephony networks. One subscription may be used for personal use and the other subscription for work. The two SIM subscriptions and their characteristics may be considered when selecting the mobile ads to present to the users on the DSDA devices. Further, knowledge on the intended or actual use of the two subscriptions may be used to select, limit, adapt, or otherwise differentiate the mobile ads delivered to the user on the two subscriptions. The channel characteristics of the two SIM subscriptions may also be used to more efficiently deliver ads to the two SIM subscriptions. | 04-30-2015 |
20150281300 | VIDEO ORIENTATION NEGOTIATION - Systems, devices, and methods for orientation negotiation are described. In one innovative aspect, a method includes receiving an orientation negotiation message at a video processing device from a first device associated with a communication session with the video processing device. The orientation negotiation message includes an indication of an orientation of the first device and at least one characteristic associated with the first device. The method also includes identifying either the video processing device or the first device perform orientation processing based at least in part on the received at least one characteristic of the first device. The method further includes transmitting a message is transmitted to said first device, said message including information indicating a result of said identifying. The identified device performs subsequent orientation processing such as rotation of images included in the communication session. | 10-01-2015 |
20150341535 | SYSTEM AND METHOD FOR DETERMINING IMAGE RESOLUTION - Systems and methods for deductively determining a resolution setting for an imaging device based on one or more features of a scene are disclosed. The features may include the size of primary or foreground faces within the scene, a maximum amount of high frequency content within the scene, a lighting condition of the scene, or a battery level of an electronic device. | 11-26-2015 |
20150381689 | Methods, Systems and Devices for Spoiler Alert and Prevention Using Networking Framework - Methods, systems and devices are provided for blocking spoiler content from being presented by a content presenting device to a user of a mobile computing device. The content presenting device and the mobile computing device may communicate using a networking framework. One or more spoiler alert events received by the content presenting device via the communication networking framework from the mobile computing device include information associated with content that has not been viewed by a user of the mobile computing device. The information associated with the content that has not been viewed is compared with the content to be presented. It may be determined whether the content to be presented by the content presenting device includes the spoiler content, and, if so, the presentation of the spoiler content by the content presenting device is restricted. | 12-31-2015 |
20160042255 | Method and Systems For Incorporating Advertisements In Objects Printed On Three-Dimensional Printers - Systems, methods, and devices of the various embodiments enable advertisements (e.g., promotions, signs, logos, samples, etc.) to be part of the 3-D printing process. In an embodiment, advertisements (i.e., “ads”), such as partial product samples, may be 3-D printed prior to 3-D printing a purchased 3-D printable good. In another embodiment, ads may be 3-D printed on a 3-D printable good itself (e.g., embossed, impressed, as a tag, etc.). In a further embodiment, users may select the ads to be 3-D printed on their goods in return for compensation from advertisers. | 02-11-2016 |
20160068264 | Methods, Systems and Devices for Delivery Drone Security - Methods, systems and devices are provided for securing a drone delivering a package of goods to a delivery destination. A notification may be provided to a device of the purchaser that the drone has arrived near the delivery destination. The drone may hover at a secure altitude from a landing zone at the delivery destination. The drone may receive a purchase code associated with a purchase of the package of goods. The drone may authenticate the purchase code as a condition for landing. The drone may land in the landing zone at the delivery destination when the purchase code is authenticated. The drone may abort the landing when the purchase code is not authenticated. The drone may receive a delivery code associated with completing delivery the package of goods. The drone may require the delivery code as a condition for releasing the package of goods. | 03-10-2016 |
20160081027 | REDUCING SWITCHING BETWEEN NETWORKS TO CONSERVE POWER AND REDUCE COSTS - Methods, systems, and devices are described for reducing switches (e.g., ping-pongs) of a wireless communications device between two or more wireless networks. For example, a method includes determining a context of data use of a first wireless network to which a wireless communications device is connected. The method includes determining a time delay associated with performing a switch from the first wireless network to a second wireless network when at least one performance indicator of the first wireless network is below a threshold performance level needed to support the context of data use. The method further includes performing the switch from the first wireless network to the second wireless network in response to the time delay expiring while the at least one performance indicator remains below the threshold performance level. | 03-17-2016 |
Patent application number | Description | Published |
20130225612 | QUINAZOLINE DERIVATIVES, COMPOSITIONS, AND USES RELATED THERETO - The invention relates to quinazoline derivatives, compositions, and methods related thereto. In certain embodiments, the invention relates to inhibitors of NADPH-oxidase. | 08-29-2013 |
20140179750 | PROSTAGLANDIN RECEPTOR EP2 ANTAGONISTS, DERIVATIVES, COMPOSITIONS, AND USES RELATED THERETO - The disclosure relates to Prostaglandin receptor EP2 antagonists, derivatives, compositions, and methods related thereto. In certain embodiments, the disclosure relates to methods of treating or preventing conditions and diseases in which EP2 receptor activation has a physiological role, such as but not limited to, brain injury, inflammatory diseases, neuroinflammation after a seizure, pain, endometriosis, cancer, rheumatoid arthritis, skin inflammation, vascular inflammation, colitis, and neurological disorders by administering a pharmaceutical composition comprising a compound disclosed herein to a subject in need thereof. | 06-26-2014 |
20140194422 | PIPERAZINE DERIVATIVES, COMPOSITIONS, AND USES RELATED THERETO - The disclosure relates to piperazine derivatives, compositions, and methods related thereto. In certain embodiments, the disclosure relates to inhibitors of NADPH-oxidase. | 07-10-2014 |
20150110723 | QUINAZOLINE DERIVATIVES, COMPOSITIONS, AND USES RELATED THERETO - The disclosure relates to quinazoline derivatives, compositions, and methods related thereto. In certain embodiments, the disclosure relates to inhibitors of NADPH-oxidases (Nox enzymes) and/or myeloperoxidase. | 04-23-2015 |