Patent application number | Description | Published |
20090279392 | ELECTRONIC DEVICE AND METHOD PROVIDING IMPROVED INDICATION THAT AN ALARM CLOCK IS IN AN ON CONDITION - An improved electronic device and method provide an improved clock feature having an alarm clock function that advantageously provides an indication to a user that the alarm is set, i.e., is in an ON condition, by outputting the alarm time itself. | 11-12-2009 |
20120079005 | METHOD, APPARATUS AND SYSTEM FOR CONTROLLING TRANSMISSION OF AN ATTACHMENT TO AN EMAIL USING A PLURALITY OF COMPUTERS - A method, apparatus and system for controlling transmission of an attachment to an email using a plurality of computers is provided. In one aspect, a client machine and a mobile computing device are provided. The client machine is configured to execute a browser application. The mobile computing device is configured to host a web server application. When the client machine and the mobile computing device are connected, functions on the mobile computing device become available on the client machine via the interaction between the web server and the browser, specifically e-mail functionality and control of transmission of attachments. Further, updates on attachment download at the mobile computing device are sent to the client machine in response to periodic requests from the client machine. | 03-29-2012 |
20120147246 | Methods And Apparatus For Use In Enabling An Efficient Review Of Photographic Images Which May Contain Irregularities - Techniques for use in an electronic device which includes a camera module for producing photographic images are described. An input request for capturing a photographic image is detected via a user interface of the electronic device. In response to detecting the input request, a photographic image is captured via the camera lens using the camera module, and the captured photographic image is produced in a visual display. In addition, a zoomed-in portion of the image is produced in the visual display, simultaneously with the display of the image. The zoomed-in portion of the image may be a picture-in-picture (PIP) window or virtual magnifying glass window overlaid with the image, for example. The image may include a blur characteristic which is only visually apparent from the zoomed-in portion of the image, in which case the image may be manually deleted by the user so that another photographic image may be captured. | 06-14-2012 |
20130013875 | METHOD AND SYSTEM FOR AUTOMATICALLY SAVING A FILE - Described herein are a method, system, and computer readable medium for automatically saving a file. A save score for the file is determined and compared against a save threshold. The save score is determined from a combination of autosave indicators indicative of whether to immediately autosave the file. Each of the autosave indicators that adjust the save score increases or decreases the likelihood that the file will be automatically saved. If the comparison indicates that the file should be automatically saved, the file is automatically saved; otherwise, the file is not automatically saved. The save score can take into consideration factors such as the number of dirty characters in the file and the time at which the file was last saved. Utilizing the save score reduces the number of saves performed when only immaterial changes have been made to the file, which helps preserve system resources such as battery life. | 01-10-2013 |
20130246794 | SYSTEMS, DEVICES, AND METHODS FOR SECURELY TRANSMITTING A SECURITY PARAMETER TO A COMPUTING DEVICE - Embodiments of the systems, devices, and methods described herein generally facilitate the secure transmittal of security parameters. In accordance with at least one embodiment, a representation of first data comprising a password is generated at the first computing device as an audio signal. The audio signal is transmitted from the first computing device to the second computing device. The password is determined from the audio signal at the second computing device. A key exchange is performed between the first computing device and the second computing device wherein a key is derived at each of the first and second computing devices. In at least one embodiment, one or more security parameters (e.g. one or more public keys) are exchanged between the first and second computing devices, and techniques for securing the exchange of security parameters or authenticating exchanged security parameters are generally disclosed herein. | 09-19-2013 |
20130288646 | SYSTEM AND METHOD FOR HANDLING MESSAGE RECEIPT NOTIFICATION - Systems and methods for operation upon a wireless mobile device to handle message notifications. A method can include receiving a message by the wireless mobile device over a wireless communications network. The received message is processed so that at least a portion of the sender's message is displayed to a user of the wireless mobile device before a signed receipt is provided to the sender. | 10-31-2013 |
20140215205 | System and Method for Exchanging Cryptographic Capabilities - In some data communication configurations, data received from a sender may need to be viewed or otherwise processed by more than one entity with a corresponding client. For example, a message sent to a corporate email address may be viewed by either or both a mobile device and a desktop device. For the sender to utilize the strongest algorithm or protocol used by the recipient, it would therefore need to know which algorithms or protocols are supported by both the mobile and desktop mail clients. A system and method are provided to enable the mobile device to know about the capabilities of related mail clients associated with the communication address (e.g. email address) and vice versa such that the intersection of the capabilities (i.e. the strongest algorithm or protocol supported by all parties involved) can be chosen and the messages or data cryptographically processed accordingly. | 07-31-2014 |