Patent application number | Description | Published |
20120015629 | SECURING A MOBILE COMPUTING DEVICE - In general, this disclosure describes techniques for unlocking certain functionality of a mobile computing device upon wirelessly detecting that an external device is in relatively close proximity to the mobile computing device. One example method comprises: providing a phone application and a second, different application; initiating a first mode of operation when the mobile computing device becomes locked; prohibiting user access to the second application during the first mode of operation when the mobile computing device fails to wirelessly detect a presence of an external device; and initiating a second mode of operation when the mobile computing device wirelessly detects the presence of the external device and when the mobile computing device has received user input specifying an access password, wherein the mobile computing device allows complete user access to both the phone application and the second application during the second mode of operation. | 01-19-2012 |
20120021724 | SECURING A MOBILE COMPUTING DEVICE - In general, this disclosure describes techniques for unlocking certain functionality of a mobile computing device upon wirelessly detecting that an external device is in relatively close proximity to the mobile computing device. One example method comprises: providing a phone application and a second, different application; initiating a first mode of operation when the mobile computing device becomes locked; prohibiting user access to the second application during the first mode of operation when the mobile computing device fails to wirelessly detect a presence of an external device; and initiating a second mode of operation when the mobile computing device wirelessly detects the presence of the external device and when the mobile computing device has received user input specifying an access password, wherein the mobile computing device allows complete user access to both the phone application and the second application during the second mode of operation. | 01-26-2012 |
20120290657 | Transferring Application State Across Devices - A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system. | 11-15-2012 |
20120290663 | Transferring Application State Across Devices with Checkpoints - A first client device executes a plurality of actively running applications, each having one or more checkpoints, each checkpoint identifying an execution breakpoint at which a respective application can be suspended and subsequently resumed. The first client device detects a transfer triggering condition, stores an application state for each of the plurality of actively running applications, and transmits the stored application state for each of the plurality of actively running applications to a second client device or system. The stored application state for each respective application of the plurality of actively running applications corresponds to a checkpoint of the respective application. Optionally, the transfer triggering condition includes presence of the second client device or system within a predefined proximity of the first client device or system, wherein the predefined proximity is a predefined proximity for near field communication. | 11-15-2012 |
20120290669 | Zero-Click Sharing of Application Context Across Devices - A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to the second client device when the first client device is positioned within a predefined proximity of the second client device. The first application has a first client device user interface state when the handoff operation is performed. Further, the first client device, in response to receiving from another client device application information associated with a second application executed by the other first client device, executes a third application corresponding to the second application with an initial user interface state corresponding to a user interface state of the other client device. | 11-15-2012 |
20130073848 | ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 03-21-2013 |
20130095756 | TECHNIQUES FOR USING SOFTWARE APPLICATION-RELATED METADATA IN NEAR FIELD COMMUNICATION TRANSMISSIONS - A computer-implemented method includes determining, at a first mobile device associated with a first user, whether a second mobile device is within range for near field communication (NFC). When in range, the method includes receiving, at the first mobile device, first data and second data from the second mobile device via an NFC transmission, the first data being based on input from a second user associated with the second mobile device, the second data being metadata indicating a software application configured to process the first data. When the first mobile device does not have the software application indicated by the second data, the method includes retrieving, at the first mobile device, the software application via a network. The method also includes providing, at the first mobile device, the first data to the first user via the software application. | 04-18-2013 |
20130138959 | Enabling Users to Select Between Secure Service Providers Using a Central Trusted Service Manager - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 05-30-2013 |
20130173699 | Zero-Click Sharing of Application Context Across Devices - A first client device performs a handoff operation to a second client device by transmitting application information, associated with a first application, to the second client device when the first client device is positioned within a predefined proximity of the second client device. The first application has a first client device user interface state when the handoff operation is performed. Further, the first client device, in response to receiving from another client device application information associated with a second application executed by the other first client device, executes a third application corresponding to the second application with a user interface state corresponding to a user interface state of the other client device. | 07-04-2013 |
20130212384 | ENABLING USERS TO SELECT BETWEEN SECURE SERVICE PROVIDERS USING A KEY ESCROW SERVICE - Systems and methods are described herein for enabling users to select from available secure service providers (each having a Trusted Service Manager (“TSM”)) for provisioning applications and services on a secure element installed on a device of the user. The device includes a service provider selector (“SPS”) module that provides a user interface for selecting the secure service provider. In one embodiment, the SPS communicates with a key escrow service that maintains cryptographic keys for the secure element and distributes the keys to the user selected secure service provider. The key escrow service also revokes the keys from deselected secure service providers. In another embodiment, the SPS communicates with a central TSM that provisions applications and service on behalf of the user selected secure service provider. The central TSM serves as a proxy between the secure service providers and the secure element. | 08-15-2013 |
20130325967 | TRANSFERRING APPLICATION STATE ACROSS DEVICES - A first client device or system performs a method that includes retaining in memory registration information for a respective application indicating the respective application is registered for sharing application state with other client devices or systems. The method further includes storing an application state of a respective application, and detecting a transfer triggering condition. The transfer triggering condition includes presence of a second client device or system within a predefined proximity of the first client device or system, and the predefined proximity is a predefined proximity for near field communication. Furthermore, upon detecting the triggering condition, the first client device or system determines, in accordance with the stored registration information, that the respective application is registered for application state sharing, and transmits the application state of the respective application to the second client device or system. | 12-05-2013 |
20140017996 | AUTOMATED SHARING OF APPLICATION DATA OVER A NEAR FIELD COMMUNICATION LINK - A computer-implemented technique includes establishing, at a first computing device including one or more processors, a near field communication (NFC) link with a second computing device. The technique includes identifying, at the first computing device, an application having a foreground designation in an operating system of the first computing device, the identifying being performed upon establishment of the NFC link with the second computing device. The technique includes determining, at the first computing device, an identifier for the application, wherein the identifier uniquely identifies the application at a source external to the first computing device. The technique also includes transmitting, from the first computing device, the identifier for the application via the NFC link to the second computing device. | 01-16-2014 |
20150088411 | Providing Digital Images to an External Device During Navigation - To provide navigation data to a head unit installed in a vehicle, an indication of a current location and a current orientation of the vehicle are received. Map data for generating a digital map of a geographic area including the current location is received from a network device via a first communication link. A digital map image is generated using the map data, such that the digital map is oriented in accordance with the current orientation. The digital map image is provided to the head unit via a second communication link | 03-26-2015 |
20150088412 | Systems and Methods for Providing Navigation Data to a Vehicle - A set of instructions implements an application programming interface (API) for providing navigation data from a portable device to a head unit of a vehicle. When invoked by a companion application executing on the portable device, the API is configured to obtain navigation data for navigating a user between a source and a destination, where the portable device receives the navigation data from a navigation server via a long-range communication link. The API is further configured to provide the navigation data to the companion application for transmission to the head unit via a short-range communication link. | 03-26-2015 |
20150088420 | SYSTEMS AND METHODS FOR PROVIDING INPUT SUGGESTIONS VIA THE HEAD UNIT OF A VEHICLE - To assist a driver with requesting navigation data via a head unit of a vehicle, partial user input provided to the head unit is received via a short-range communication link and suggested input corresponding to the partial user input is generated. The partial user input includes a sequence of alphanumeric characters. The suggested input includes the sequence of alphanumeric characters and one or more additional characters and corresponds to a set of one or more geographic locations. The suggested input is provided to the head unit via the short-range communication link. | 03-26-2015 |