Patent application number | Description | Published |
20120319919 | PIFA ARRAY - A PIFA (Planar Inverted-F Antenna) array antenna has multiple PIFAs. The PIFA array is used to provide different radiation patterns for communication. A signal being emitted by the PIFA array is manipulated. According to the manipulation, the PIFA array may emit the signal with an omni-directional radiation pattern or a directional radiation pattern; the same PIFA array (antenna) is used for both directional communication and omni-directional communication. The PIFA array may be used in mobile computing devices, smart phones, or the like, allowing such devices to transmit directionally and omni-directionally. The signal manipulation may involve splitting the signal into components that feed PIFAs, and before the components reach the PIFAs, changing properties of the components (e.g., phase) relative to each other. | 12-20-2012 |
20140040139 | SYSTEM AND METHOD FOR DYNAMIC TEMPORARY PAYMENT AUTHORIZATION IN A PORTABLE COMMUNICATION DEVICE - A system for issuing a dynamic temporary credential to a portable communication device for use in a transaction with an electronic control point. The system receives the current geo-location of the portable communication device and transmits a dynamic temporary credential to the portable communication device from the centralized computer. The system further scores the risk in authorizing a transaction associated with an electronic control point using the dynamic temporary credential it issued. The system may prevent the transmission of the dynamic temporary credential until the end user has been authenticated, which may include verifying one or more of a manually input passcode, the unique digital signature of the portable communication device, and know your customer queries. The system may further include a validation mapping gateway operably connected to one or more issuers that substitutes legacy payment data for the dynamic temporary credential in a payment transaction before sending the payment transaction along with the risk score to the issuer associated with the legacy payment data. | 02-06-2014 |
20140074722 | USE OF STATE OBJECTS IN NEAR FIELD COMMUNICATION (NFC) TRANSACTIONS - A near field communication (NFC)-enabled client device includes one or more computer-readable storage media and an NFC interface component operational in a card emulation mode of an NFC protocol. The client device also includes an application for performing a transaction using the NFC protocol. The application is stored on the one or more computer-readable storage media. Programming logic is configured to receive and store a state object (e.g., a cookie) provided by a security authority using the NFC protocol when performing a transaction using the application. The state object includes an identifier, data payload and a public key associated with the security authority. The programming logic is also configured to transmit the state object to the security authority upon receiving an HTTP operation identifying the state object. | 03-13-2014 |
20140247822 | DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT - The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business. | 09-04-2014 |
Patent application number | Description | Published |
20080291852 | METHOD FOR OPTIMIZING NEAR FIELD LINKS - In a Near Field Communications (NFC) link, the data link turn-around time is adjusted to optimize battery use while maximizing the data throughput. A receiving device immediately transmits any pending high priority control or data messages in its own queue in response to a message from the sending device, subject to the flow control status of the sending device. The value of the delay time before sending a SYMM primitive is selected in accordance with the types of link frames recently received. | 11-27-2008 |
20100093278 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 04-15-2010 |
20100317332 | MOBILE DEVICE WHICH AUTOMATICALLY DETERMINES OPERATING MODE - A mobile device such as a cell phone is used to remotely control an electronic appliance such as a television or personal computer. In a setup phase, the mobile device captures an image of the electronic appliance and identifies and stores scale-invariant features of the image. A user interface configuration such as a virtual keypad configuration, and a communication protocol, can be associated with the stored data. Subsequently, in an implementation phase, another image of the electronic appliance is captured and compared to the stored features in a library to identify a match. In response, the associated user interface configuration and communication protocol are implemented to control the electronic appliance. In a polling and reply process, the mobile device captures a picture of a display of the electronic device and compares it to image data which is transmitted by the electronic appliance. | 12-16-2010 |
20100317371 | CONTEXT-BASED INTERACTION MODEL FOR MOBILE DEVICES - A context-aware mobile device such as a cell phone automatically determines appropriate user interface (UI) settings to implement at different times and/or locations. A behavior of the mobile device is tracked by determining locations visited and UI settings which are manually configured by the user. Patterns in the movement and UI settings relative to one another and to time are detected. When a particular location or time is subsequently reached which corresponds to the pattern, an appropriate UI setting can be implemented, thereby relieving the user of this task. Locations can be detected by electromagnetic signals at different locations, such as from a Wi-Fi network, Bluetooth network, RF or infrared beacon, or a wireless point-of-sale terminal. An identifier from the signals such as an SSID can be stored. Labels for locations can be automatically assigned, or the user can be prompted to provide a label for commonly visited locations. | 12-16-2010 |
20110069179 | NETWORK COORDINATED EVENT CAPTURE AND IMAGE STORAGE - A system and method are disclosed for coordinating different image capture devices at an event so that images captured by the different devices may form a cohesive and consistent image set. The system includes a group of image capture devices, referred to herein as an event capture group, wirelessly communicating with a remote server. The image capture devices in an event capture group may consist of still image cameras, video recorders, mobile phones and other devices capable of capturing images. The server coordinates the devices in a group before images are taken, so that the resultant images from the different devices are consistent with each other and may be aggregated into a single, cohesive image set. Images from different devices in the group may be uploaded during an event and organized on a remote database into the image set which may be viewed during or after the event. | 03-24-2011 |
20110287718 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 11-24-2011 |
20120110568 | Viral Application Distribution - Viral application distribution facilitates distribution of an application among users and increases likelihood of downloading the application by the users. A first device may receive information of an application from a second device through a short-range communication channel. The information may comprise identification information of the application without any personally identifiable information of the second device to protect privacy of a user of the second device. A version of the application that is compatible with the first device is determined by searching a catalog using the identification information of the application. The compatible version of the application may then be downloaded or obtained by the first device. Location-based viral distribution may also be performed between devices that visit a location, even at different times. | 05-03-2012 |
20120116905 | APPLICATION STORE TASTEMAKER RECOMMENDATIONS - An application store tastemaker recommendation service is usable to determine experts within a user's social network(s), receive recommendations from the experts, and filter and/or rank mobile application query results based at least in part on the recommendations. Additionally, the service may be usable to determine experts based on data compiled about previous actions, reviews, comments, etc., of the experts. Further, the service may be usable to provide recommendations to the user to aid in selecting mobile applications for purchase, and may provide an avenue for completing such purchases. | 05-10-2012 |
20120117558 | MOBILE APPLICATION MIGRATION SERVICE - A mobile application migration service is usable to receive recommendations for replacement and/or alternative mobile applications for potential mobile device upgrades. Additionally, the service may be usable to compare legacy mobile applications to potential target mobile applications and simulate operation of selected target applications on a new target device. Further, a service may be usable to provide one-click purchase of one or more target applications, one-click installation of the selected target applications, and/or one-click migration of associated user and/or application data from a legacy device to a new device. Such recommendations, comparisons, simulations, and one-click migrations may be used to facilitate migration from one mobile device to another, even when legacy devices are customized with highly useful and/or often used applications. | 05-10-2012 |
20120143677 | Discoverability Using Behavioral Data - The present disclosure describes a system and method of increasing discoverability of software applications in a marketplace catalog via behavioral data. Specifically, a client monitors behavioral usage of applications with a local usage tracking framework, optionally utilizing a data template. The data is aggregated either on the client or on a server or both, and synchronized with a server storage to be made available via application behavioral services. The client may also host an advertising placement framework to place selected advertising in the view of the client's user. Application behavioral services may apply one or more behavioral algorithms to the aggregated behavioral usage, to generate recommendations to maximize marketplace catalog ranking, visibility and projected revenue. | 06-07-2012 |
20120143694 | USING BEHAVIORAL DATA TO MANAGE COMPUTER SERVICES - Some implementations provide techniques for managing features provided by a computer service. A service side framework may receive usage data relating to an application executed on a client device. One or more behavioral algorithms may be implemented to perform behavioral analysis on the received usage data to identify at least one behavioral trend associated with the application. At least one feature of the computer service may be modified based on at least some of the behavioral analysis performed on the usage data. In some implementations, location data may also be taken into consideration. | 06-07-2012 |
20120214414 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 08-23-2012 |
20130230082 | METHOD FOR OPTIMIZING NEAR FIELD LINKS - In a Near Field Communications (NFC) link, the data link turn-around time is adjusted to optimize battery use while maximizing the data throughput. A receiving device immediately transmits any pending high priority control or data messages in its own queue in response to a message from the sending device, subject to the flow control status of the sending device. The value of the delay time before sending a SYMM primitive is selected in accordance with the types of link frames recently received. | 09-05-2013 |
20130238592 | APPLICATION STORE TASTEMAKER RECOMMENDATIONS - An application store tastemaker recommendation service determines experts within a user's social network(s), receives recommendations from the experts, filters and/or ranks mobile application query results based at least in part on the recommendations. Additionally, the service may further determine the experts based on data compiled about previous actions, reviews, comments, etc., of the experts. Further, the service may provide recommendations to the user to aid in selecting mobile applications for purchase, and may provide an avenue for completing such purchases. | 09-12-2013 |
Patent application number | Description | Published |
20110093318 | VIRAL DISTRIBUTION AND TRACKING OF ELECTRONIC COUPONS - Distributing and tracking electronic coupons based on proximity. Upon detecting recipients proximate to a computing device, one or more electronic coupons are selected and transmitted to the detected recipients. The transmittal occurs via a wireless connection in some embodiments. Coupon properties associated with the transmitted coupons are adjusted (e.g., values decreased, expiration conditions modified, location of transmittal, etc.). Distribution data for the transmitted coupons is stored to maintain a distribution history. | 04-21-2011 |
20110131172 | IDENTIFYING GEOSPATIAL PATTERNS FROM DEVICE DATA - Determining geospatial patterns from device data collected from a plurality of computing devices. The devices represent, for example, a plurality of sources providing the device data. The device data describes the computing devices and/or environments thereof. Some embodiments present the determined patterns to users for editing, update maps with the edited patterns, and distribute the maps to the users. The maps are stored to create a searchable map library. | 06-02-2011 |
20110269444 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20110269445 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20120035989 | PERSONALIZATION OF A MOBILE COMMUNCATION DEVICE - An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least partially cover its exterior. At least one graphic design is disposed on the exterior surface of the accessory body to convey a theme. A data tag is secured to the accessory. The data tag stores data that facilitates personalization of at least one functionality of the mobile communication device in support of the theme. The data tag being configured so that the data is accessible via a short-range wireless protocol such as the Near-Field Communication (NFC) protocol. | 02-09-2012 |
20120099727 | PROVISIONING TECHNIQUES - Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key. | 04-26-2012 |
20120143669 | LOYALTY OFFER MODELING - Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant. | 06-07-2012 |
20120143758 | Account Transfer Techniques - Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services. | 06-07-2012 |
20120144201 | SECURE ELEMENT AUTHENTICATION - Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware. | 06-07-2012 |
20120276992 | MOST VALUABLE PLAYER GAMER STATUS AND APPLICATIONS - A gaming environment is provided by an MVP gaming system provider in which “most valuable player” (MVP) gamers may compete. MVP gamers may be identified using achievements, gamer scores, game play during sanctioned gaming events, or other indicia of game skills. The MVP gamers may be sponsored by advertisers, and the MVP gamers' avatars may be branded based on sponsorship during gaming events. The sponsorships may be brokered by the MVP gaming system provider. Some gaming events may be sanctioned gaming events that are coordinated by the MVP gaming system provider and “televised” to allow viewers to watch the gaming events. Tutorials from MVP gamers may also be provided to gamers for viewing to assist in their game play. Further, gamers may be able to rent the avatars of MVP gamers for use during their game play. | 11-01-2012 |
20120278154 | MARKETING INVENTORY BASED ON SPOILAGE - An inventory marketing system operates to identify and market inventory items that are likely to spoil. Initially, inventory items that have a particular likelihood of spoilage may be identified. Customers to target with offers for the inventory items may be identified based on the customers' current location or expected location near a spoilage time for the inventory items. Offers for the inventory items may be provided to the targeted customers, and purchases of the inventory items by customers may be facilitated. | 11-01-2012 |
20130090064 | DYNAMIC RANGE WIRELESS COMMUNICATIONS ACCESS POINT - The claimed subject matter provides for systems and/or methods for a dynamic range wireless access point to initiate deliberate and/or selective communications with one or more wireless devices over a short range radio path. One embodiment of an access point system comprises a processor that transfers one or more wireless devices to a long range radio path once a transition condition has been met. In another embodiment, an access point system may affect transactions between user/customer's smart devices and a commercial place of business where the access point system and the smart devices initiate communications when the smart devices are deliberately placed within the proximity of the access point antenna and/or the smart devices are brought within the vicinity of the access point antenna such as by passing through the entrance or exit to the place of business. | 04-11-2013 |
20140040179 | IDENTIFYING GEOSPATIAL PATTERNS FROM DEVICE DATA - Determining geospatial patterns from device data collected from a plurality of computing devices. The devices represent, for example, a plurality of sources providing the device data. The device data describes the computing devices and/or environments thereof. Some embodiments present the determined patterns to users for editing, update maps with the edited patterns, and distribute the maps to the users. The maps are stored to create a searchable map library. | 02-06-2014 |
Patent application number | Description | Published |
20080201354 | Host context framework - Techniques for host context framework are described. An apparatus may comprise a client device having a host application program with multiple host item objects, and a host context manager to manage multiple host contexts corresponding to the host item objects. The host context manager may create a host context for each host item object, and perform operations for each host item object in accordance with the corresponding host context. Other embodiments are described and claimed. | 08-21-2008 |
20080222079 | Enterprise data as office content - Techniques for enterprise data as office content are described. An apparatus may comprise a client device having an application program, an insertion component and an update component. The insertion component may be arranged to insert source data elements from a data source into a document for the application program. The update component may be arranged to update the inserted data elements as the source data elements are modified. Other embodiments are described and claimed. | 09-11-2008 |
20090319548 | AGGREGATION OF DATA STORED IN MULTIPLE DATA STORES - A data aggregation system is described herein for accessing and viewing information about an entity stored in multiple data stores. The data aggregation system identifies an entry in a primary data store that contains information about an entity. The system receives a request to associate an entry in a secondary data store with the identified entry in the primary data store. Then, the system identifies information in the secondary data store that identifies the entry in the secondary data store and associates the identified information with the entry in the primary data store. When a user requests to view the entry in the primary data store, the system retrieves the information about the entry in the primary data store and uses the stored entry identifier to also retrieve the information about the entry from the secondary data store. Thus, the information remains in the data store in which it originated, but the data aggregation system provides a unified view. | 12-24-2009 |
20090319921 | IMPLEMENTING CUSTOM USER INTERFACE FORMS IN A PERSONAL INFORMATION MANAGER - Technologies are described herein for incorporating custom user interface (UI) forms into a personal information manager (PIM) application using a declarative form markup specification. A native PIM form specification is generated from a file containing the declarative form markup describing the custom UI form. When a request to display the custom UI form is received, a PIM native form renderer invokes a forms runtime engine that loads the original declarative form markup to process data bindings and event subscriptions contained therein. The custom UI form is then rendered to the display by the PIM native form renderer in conjunction with the forms runtime engine. | 12-24-2009 |
20120260162 | ENTERPRISE DATA AS OFFICE CONTENT - Techniques for enterprise data as office content are described. An apparatus may comprise a client device having an application program, an insertion component and an update component. The insertion component may be arranged to insert source data elements from a data source into a document for the application program. The update component may be arranged to update the inserted data elements as the source data elements are modified. Other embodiments are described and claimed. | 10-11-2012 |
20140122569 | BRIDGING ON PREMISE AND CLOUD SYSTEMS VIA CANONICAL CACHE - Sending data using a remote based cache. A method includes receiving at a remote based cache, data from a first system. The data from the first system is intended for a second system. The method further includes caching the data from the first system that is intended for the second system at the cache. The method further includes providing the data from the cache to a third system prior to the data being provided to the second system. | 05-01-2014 |
20140181277 | MANAGING TECHNOLOGY RESOURCES ACROSS MULTIPLE PLATFORMS - The present invention extends to methods, systems, and computer program products for managing technology resources across multiple platforms. Embodiments of the invention can be used to manage the configuration of a plurality of different devices. A management server/service can utilize native management capabilities of different devices to provide configuration management without requiring agents to be installed on the devices. In general, the management server/service adapts to the unique characteristics and behaviors of different devices, platforms, and external systems to provide configuration management for the different devices, platforms, and external systems. As such, configuration management can be provided in a unified fashion across different platforms, both on-premise and off-premise, and indirectly. When client agents are present, the management server/service can adjust to compatibly operate with the client agents. | 06-26-2014 |