Patent application number | Description | Published |
20130339214 | System and Method for Display Management Based on User Attention Inputs - A system and method are provided for managing data being displayed on at least one monitor screen based on monitoring user's attention in relation to the monitor screen. In one embodiment, upon detecting that the user's attention is leaving at least a portion of a screen, the system may alert the user of such an event. Alternatively, the system could alert the user upon detecting a triggering condition while the user's attention is away from the at least a portion of the screen. The step of alerting the user may include modifying at least a portion of a display on a monitor not being viewed by the user. Additionally, the system may initiate preparation of a report including any data not being viewed by a user during the time period when the user is not viewing a portion of the monitor. | 12-19-2013 |
20140012730 | System and Method for Computing and Displaying Effective Bid and Ask Information - Software at a trading station receives a data feed from an electronic exchange and computes an effective bid price and/or an effective ask price based on a particular quantity to trade. Then, the effective bid price and/or effective ask prices are indicated to the user. An effective bid price is an average price at which a quantity could be sold based on current market conditions. An effective ask price is an average price at which a quantity could be bought based on current market conditions. Depending on the available quantities in the market, the effective prices may represent spreads different from the actual spread of the inside market. Additionally, a derivative of price, such as yield, may be used to compute other types of effective bid and/or ask information. | 01-09-2014 |
20140180902 | SYSTEM AND METHOD FOR PRIORITIZED AUTOMATED TRADING IN AN ELECTRONIC TRADING ENVIRONMENT - A system and method are provided for prioritized automated trading. One example method may include receiving a plurality of parameters, where each parameter has an order-related action associated with a trading strategy, and then detecting one or more events that trigger a plurality of order related actions. The method then includes determining priority levels in relation to a plurality of triggered order-related actions using at least one priority rule, and processing the plurality of triggered order-related action in an order associated with the determined priority levels. | 06-26-2014 |
20140188682 | User Definable Prioritization of Market Information - Methods and systems for user definable prioritization of market information are disclosed. An example method to prioritize market information displayed in a window within a trading interface includes updating the market information displayed in the window at a first frequency, wherein the first frequency is to correspond to a first window priority. The example method also includes, based on a trigger activation, assigning a second window priority to the window, wherein the second window priority is to cause the market information displayed in the window to update at a second frequency, the second frequency different from the first frequency. | 07-03-2014 |
20140236800 | System and Method for Modifying Trading Strategies Based on Message Usage - A system and method are provided for implementing an electronic exchange-based transaction message policy. One example method includes defining a message usage threshold to be used in relation to a client entity that utilizes one or more trading strategies and sends transaction messages to an electronic exchange. The method further includes dynamically monitoring the message usage at the client entity and comparing it to the defined message usage threshold. If the message usage exceeds the threshold limit, the method includes adjusting one or more trading strategies at the client entity in attempt to not violating the exchange-based transaction message policy. | 08-21-2014 |
20140279345 | Charting Multiple Markets - The present embodiments relate to charting multiple markets. In some embodiments, charting multiple markets may include receiving market data for a plurality of tradeable objects. The plurality of tradeable objects may include an anchor object and at least one non-anchor object. The market data may include anchor object price data for the anchor object and non-anchor price data for the at least one non-anchor object. The non-anchor object price data may be converted based on the anchor object price data such that converted non-anchor object price data has a price scale of the anchor object price data. The anchor object price data and the non-anchor object price data may be displayed along a normalized price axis. | 09-18-2014 |
20140310143 | Configurable Non-Numeric Quantity Data Feed Display - A tool and method for transmitting and displaying market depth information associated with a tradeable object trading in a market is disclosed. The tool and method provide a mechanism by which market depth information may be withheld when the change in market depth information is not sufficiently significant. In response to transmitting market depth information, the market depth information is displayed using indicators associated with range instead of a value. | 10-16-2014 |
20140324667 | System and Method for Computing and Displaying Effective Bid and Ask Information - Software at a trading station receives a data feed from an electronic exchange and computes an effective bid price and/or an effective ask price based on a particular quantity to trade. Then, the effective bid price and/or effective ask prices are indicated to the user. An effective bid price is an average price at which a quantity could be sold based on current market conditions. An effective ask price is an average price at which a quantity could be bought based on current market conditions. Depending on the available quantities in the market, the effective prices may represent spreads different from the actual spread of the inside market. Additionally, a derivative of price, such as yield, may be used to compute other types of effective bid and/or ask information. | 10-30-2014 |
20140330698 | DYNAMICALLY ACTIVATING AND DEACTIVATING ONE OR MORE ELEMENTS OF A TRADING TOOL - Various embodiments relate to intelligently activating and deactivating a trading tool element of a trading tool to improve a user's confidence in the trading tool. By dynamically activating and deactivating elements on the trading screen, the trading tool effectively increases a user's confidence in placing a trading order, canceling a trade order, or both, for example, by eliminating or reducing undesirable options. Undesirable options might include those that are risky, contrary to a particular trading strategy, would result in a loss of money, and so on. Such an embodiment can improve the overall speed at which a user places or cancels a trade order by, among other things, effectively increasing the user's overall confidence in the trading tool. | 11-06-2014 |
20140351114 | Repositioning of Market Information on Trading Screens - As market conditions descend or ascend an axis of prices, the display of market information is repositioned, at a pre-determined rate if desired, around an item of interest. An item of interest may include the best bid price, the best ask price, the inside market, a moving average, a last traded price, a theoretical value, the result of an equation, or some other item of interest to the trader. According to the present embodiments, market information may be displayed in a region relative to an axis of prices, and when an event occurs, a repositioning signal is initialized causing the axis to be repositioned such that the item of interest is positioned at a pre-determined location in the region. The price axis can be repositioned at a fixed rate or at a dynamically variable rate. | 11-27-2014 |
20150019397 | Dynamic Market Order Execution Validation Mechanism - A system, method, and non-transitory computer-readable information recording medium allows a user or trader to prepare, and send to an exchange, a trade order using a trading device. The trading device receives market data from an exchange and displays the received market data on a display unit of the trading device. The trading device also receives a trade order instruction via an input device at the trading device and detecting an occurrence of a market update as a function of the received market data within an established trade order time period associated with a time at which the trade order was received. If the occurrence of the market update was detected during the established trade order time period, the execution of the trade order is prevented. | 01-15-2015 |
20150019399 | TRADING CIRCLES - The disclosed embodiments provide trading circles. An example method includes defining a group having a plurality of members, wherein one or more of the plurality of members interacts with an exchange that facilitates market transactions; detecting a first interaction of a first group member with the exchange; and communicating, in response to detecting the first interaction, data related to the first interaction to a second group member before the first group member receives confirmation of the first interaction from the exchange. | 01-15-2015 |
20150066734 | Method and Apparatus for Motion Based Target Prediction and Interaction - Embodiments for motion based target prediction and interaction are described herein. One example embodiment includes predicting a target element based on a user moving a cursor in relation to a trading interface. When a target element is identified, one or more actions may be pre-configured based on the target element. For example, when a target element is associated with a buy action and a price, an order message to buy a tradable object at the price may be generated based on the predicted target element. Then, a user action may be received to select the target element and to execute the action. The user action selecting the target element may be received prior to the cursor reaching the desired target. | 03-05-2015 |
20150066735 | Method and Apparatus for Motion Based Target Prediction and Interaction - Embodiments for motion based target prediction and interaction are described herein. One example embodiment includes predicting a target element based on a user moving a cursor in relation to a trading interface. When a target element is identified, one or more actions may be pre-configured based on the target element. For example, when a target element is associated with a buy action and a price, an order message to buy a tradeable object at the price may be generated based on the predicted target element. Then, a user action may be received to select the target element and to execute the action. The user action selecting the target element may be received prior to the cursor reaching the desired target. | 03-05-2015 |
20150109199 | System and Method for Display Management Based on User Attention Inputs - A system and method are provided for managing data being displayed on at least one monitor screen based on monitoring user's attention in relation to the monitor screen. In one embodiment, upon detecting that the user's attention is leaving at least a portion of a screen, the system may alert the user of such an event. Alternatively, the system could alert the user upon detecting a triggering condition while the user's attention is away from the at least a portion of the screen. The step of alerting the user may include modifying at least a portion of a display on a monitor not being viewed by the user. Additionally, the system may initiate preparation of a report including any data not being viewed by a user during the time period when the user is not viewing a portion of the monitor. | 04-23-2015 |
20150186998 | CALCULATING AND DISPLAYING PRICE COLLAR INDICATORS FOR MARKET DATA - Some embodiments of the invention provide systems and methods for displaying market data that are operatively configured to display, upon the triggering of a price collar trading period, visual indications of a current average price for a tradeable object, an upper price limit, a lower price limit and the duration of the price collar period through a trading interface. | 07-02-2015 |
20160035030 | Graphical Display with Integrated Recent Period Zoom and Historical Period Context Data - A system and method are provided for displaying a data series. In one embodiment, a graphical interface is provided including at least one axis that is divided into a plurality of axis regions. Preferably, each axis region uses a different linear scale, and the plurality of axis regions forms a continuous non-linear scale. The graphical interface also displays the data series in relation to the plurality of axis regions, and the data series is plotted in relation to each axis region based on a scale resolution corresponding to each respective axis region. | 02-04-2016 |
Patent application number | Description | Published |
20130237204 | SYSTEM AND METHOD FOR UPLOADING LOCATION INFORMATION BASED ON DEVICE MOVEMENT - Systems and methods for uploading location information based on device movement are disclosed. In some embodiments, location information may be received or determined by a mobile communications device. The location information may be associated with a physical location of the mobile communications device. A rate of movement of the mobile communications device may be identified. In some embodiments, the location information may be transmitted or uploaded from the mobile communications device to a server. The frequency of the transmitting or uploading of the location information may be based on the rate of movement of the mobile communications device. | 09-12-2013 |
20140075365 | METHOD AND SYSTEM FOR VISUALLY MONITORING THE PROGRESS OF A SECURITY OPERATION OF AN ELECTRONIC DEVICE - Security is enhanced for a user of an electronic device by providing a method for visually monitoring the progress of a security operation on an electronic device that provides a plurality of objects including at least one of an application, a document, a file, an image, and a record. When a security operation is launched for at least some of the plurality of objects, an operation window is displayed on the electronic device's display screen. The operation window includes a first operation icon corresponding to a first object on which the security operation is currently being performed. The first operation icon includes a thumbnail icon representing the first object and an operation completion indicator that visually indicates a completion level of the security operation currently being performed on the first object. | 03-13-2014 |
20140120961 | SYSTEM AND METHOD FOR SECURE MESSAGE COMPOSITION OF SECURITY MESSAGES - Systems and methods are provided for secure composition of security messages. A text message template may be displayed on a display of a mobile communications device. The text message template may include a first text field associated with a semantic category representing a plurality of items identified based on their meaning. At least one button associated with the semantic category may be presented on the display of the mobile communications device. An input may be received at the at least one button from a user of the mobile communications device. At least some of the plurality of items belonging to the semantic category associated with the first text field may be presented on the display of the mobile communications device. A selection of an item of the plurality of items may be received. The selected item may be presented in the first text field of the text message template. | 05-01-2014 |
20140128021 | SYSTEM AND METHOD FOR USING CONTEXT MODELS TO CONTROL OPERATION OF A MOBILE COMMUNICATIONS DEVICE - User activity on a mobile device is monitored and collected, and a resource usage model is constructed. The resource usage model describes a set of contexts in which the mobile device, and is the basis for determining a first exhaustion point for a resource. Based on the monitored activity, a prediction of a second exhaustion point for the resource time is made. If the second exhaustion point is prior to the first exhaustion point, usage of the resource is reduced. | 05-08-2014 |
20140128047 | SYSTEM AND METHOD FOR CALL BLOCKING AND SMS BLOCKING - Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, an electronic communication identified by a phone number is intercepted at a mobile communications device before the electronic communication is received by an application program on the device. The phone number is sent to a server for the server to identify a category associated with the phone number. The category is received at the mobile communication device. Based on the received category, a determination is made as to whether the application program should be allowed to receive the electronic communication. If allowed, the electronic communication is forwarded to the application program; else, the electronic communication is not forwarded. | 05-08-2014 |
20140148120 | METHOD AND SYSTEM FOR MANAGING AN EMERGENCY FOR ENHANCED USER SECURITY USING A MOBILE COMMUNICATION DEVICE - Security is enhanced for a user of a mobile communications device by providing a method for managing an emergency event includes detecting, by a mobile communication device having a GUI for displaying information to a user, an indication that an emergency event is occurring. Once the emergency event is detected, a plurality of event options is displayed on the GUI to a responding user who is not an owner of the mobile communication device. Each event option is associated with at least one instruction relating to an emergency action and/or response. When an indication selecting a first event option is received, the mobile communication device executes the instruction(s) associated with the first event option. | 05-29-2014 |
20140156784 | METHOD AND SYSTEM FOR PROVIDING AN APPLICATION TO AN ELECTRONIC DEVICE FOR ENHANCING USER SECURITY - Security is enhanced for a user of electronic devices by providing a method for providing an application to an electronic device. According to an embodiment, an application in a source electronic device can be cloned from the source electronic device to a target electronic device. According to an embodiment, when the application is selected, the source device can be configured to automatically collect the selected application and configuration information, state information and/or application data associated with the selected application. The collected information is referred to as “cloning data.” Once the cloning data is collected, the source device can be configured to transmit at least a portion of the cloning data to the target electronic device, which can utilize the cloning data to clone the application into the target electronic device. | 06-05-2014 |
20140165169 | METHOD AND SYSTEM FOR MANAGING USER LOGIN BEHAVIOR ON AN ELECTRONIC DEVICE FOR ENHANCED SECURITY - Security is enhanced for a user of an electronic device by providing a method for managing user login behavior. When an entered password that is different from a defined password is received, the method includes identifying alternative characters for at least one character of the entered password based on a location of a key corresponding to the character of the entered password on a keyboard used to enter the password. When the alternative characters are identified, a variation of the entered password is generated by replacing a character of the entered password with an alternative character of the character. When information relating to the variation matches information relating to the defined password, the entered password is determined to be valid. | 06-12-2014 |
20140172140 | METHOD AND APPARATUS FOR CROSS DEVICE AUDIO SHARING - A method and apparatus for providing cross device sharing of audio content. Computing devices are configured with an audio sharing component, and the audio sharing components of multiple computing devices are connected through a communications link thus forming a virtual audio channel. One computing device is selected as the destination receiver device, and the other computing devices are source devices for generating audio content. The audio sharing component of the source devices transmits audio content onto the virtual channel, where it is received by the selected destination device. | 06-19-2014 |
20140173026 | METHOD AND APPARATUS FOR CROSS DEVICE NOTIFICATIONS - A method and apparatus for providing cross device notifications. A cross notification component is provided in multiple devices. In some devices, the cross notification component is at least configured to transmit notices to other devices, and to receive responses to its notice transmissions. In some devices, the cross notification component is at least configured to receive the notices transmitted by other devices, and to generate and transmit responses to received notices. | 06-19-2014 |
20140181721 | GRAPHICAL USER INTERFACE FOR IMPROVED TEXT CHARACTER ENTRY - A graphical user interface for improved text character entry is disclosed. In some embodiments, the graphical user interface may be displayed on a mobile communications device. The graphical user interface may display a message field, a soft keyboard, and at least one visual foveal echo field. The message field may display text characters of a message being authored by a user interacting with the soft keyboard. The visual foveal echo field may be placed adjacent to a soft keyboard row and contain a portion of the message being authored by the user. | 06-26-2014 |
20140187202 | METHOD AND APPARATUS FOR AUXILIARY COMMUNICATIONS WITH MOBILE COMMUNICATIONS DEVICE - A method and apparatus for auxiliary communications capability in a mobile communications device. The mobile communications device is configured with a hidden ROM that configures a security component to work separate and apart from the OS. A secondary transceiver is configured with the security component to send and receive security transmissions, also separate and apart from the OS and the primary transceiver of the OS. Logic to detect specified trigger events is hard-coded into the hidden ROM, and detection of such an event places the mobile communications device into a special security mode. While in the special security mode, the secondary transceiver can send and receive security messages, including the location of the mobile communications device. Further, depending upon the received messages or commands, the security component can take pre-programmed security actions, such as erasing or faking data in the device. | 07-03-2014 |
20140188886 | USER CLASSIFICATION BASED ON DATA GATHERED FROM A COMPUTING DEVICE - Data regarding user actions on a user device is gathered from the user device (and/or from another computing device) by a server. The data is analyzed to make a decision. The decision is sent by the server to the user device (e.g., directly or via another computing device) and then used by the user device to implement a new action on the user device. This process may be automatically repeated in order to provide real-time customization of the user device. | 07-03-2014 |
20140189808 | MULTI-FACTOR AUTHENTICATION AND COMPREHENSIVE LOGIN SYSTEM FOR CLIENT-SERVER NETWORKS - Embodiments are directed to a system and method for authenticating a user of a client computer making a request to a server computer providing access to a network resource through an authentication platform that issues a challenge in response to the request requiring authentication of the user identity through a reply from the client computer, determining one or more items of context information related to at least one of the user, the request, and the client computer, and determining a disposition of the request based on the reply and the one or more items of context information. The reply includes a user password and may be provided by an authorizing client device coupled to the client computer over a wireless communications link. | 07-03-2014 |
20140196158 | METHOD AND SYSTEM FOR PROTECTING PRIVACY AND ENHANCING SECURITY ON AN ELECTRONIC DEVICE - A method for protecting privacy and enhancing security on an electronic device is provided. When sensor information associated with at least one user input action is collected by a sensor in an electronic device hosting a plurality of applications, the method includes intercepting a request to access the sensor information from a requesting application of the plurality of applications, and controlling access to the sensor information associated with the at least one user input action based on the requesting application. By controlling access to the sensor information, leakage of sensitive or secure information to a malicious background application is minimized and privacy and security are enhanced. | 07-10-2014 |
20140201655 | METHOD AND SYSTEM FOR MANAGING AND DISPLAYING ACTIVITY ICONS ON A MOBILE DEVICE - Embodiments are directed to adapting the display of icons on a mobile device using geographical location, temporal context, and frequency of use of an application. Different display screens are provided depending on the context. The visual appearance of an icon is adjusted by changing icon location, size, border, shape, color, or opacity. | 07-17-2014 |
20140201681 | METHOD AND SYSTEM FOR MANAGING AND DISPLAYING ACTIVITY ICONS ON A MOBILE DEVICE - Embodiments are directed to managing applications and displaying icons on a mobile device through processes that monitor usage of the applications by a user, alter a display of an application icon based on the usage of the application and a context of the mobile device, and suggest substitute or additional applications for installation based on the usage of the application. The context may comprise a location of the device, a time and/or frequency of usage of an application, and an activity associated with the usage of the application. The icon may be minimized or eliminated from display if the usage falls below a defined threshold for a context, or it may be maximized if the usage exceeds the defined threshold for the context. | 07-17-2014 |
20140201844 | DETECTION OF AND PRIVACY PRESERVING RESPONSE TO OBSERVATION OF DISPLAY SCREEN - The security and privacy of a user is enhanced by monitoring the background environment in which the user is working for changes. In an embodiment, a first or reference image is acquired using a front-facing camera of the user's computing device. A second or target image is acquired using the front-facing camera. The images are compared and an alert is generated if there is a change in background that exceeds a threshold. The change may be a person who has entered the environment and is watching the computing device screen. The alert may include reducing the visibility of information shown on the screen. | 07-17-2014 |
20140279111 | SYSTEM AND METHOD FOR AUTHORIZING A MOBILE PAYMENT TRANSACTION - A method for authorizing a mobile payment transaction is provided. The method includes receiving, by a server, a request to authorize a payment transaction which originates from a mobile payment point of sale (POS) module. In an embodiment, the request includes payment information of the payment transaction and location information of the POS module. When the request is received, an authorizing client device for the payment transaction is identified based on the payment information and a disposition of the request to authorize the payment transaction is determined based on whether the authorizing client device is located within a predetermined proximity to the POS module. | 09-18-2014 |
20140282877 | SYSTEM AND METHOD FOR CHANGING SECURITY BEHAVIOR OF A DEVICE BASED ON PROXIMITY TO ANOTHER DEVICE - The security and convenience of a mobile communication device is enhanced based on a separate key device. If the key device is near the mobile communication device, the mobile communication device may be automatically unlocked without the user having to input an unlock code. The mobile communication device may be automatically unlocked into a first mode having a first level of functionality. If the user inputs a correct unlock code, the mobile communication device may be unlocked into a second mode having a second level of functionality, greater than the first level of functionality. | 09-18-2014 |
20140298426 | METHODS AND SYSTEMS FOR ESTABLISHING SECURE COMMUNICATIONS - A method for providing a bit string on at least two electronic devices is provided. A sensor input is received by sensors in the electronic devices and recorded by the electronic devices. Data points are generated from the sensor input by each of the electronic devices. Each device samples its generated data points at a sampling frequency. A bit string is then generated by each device based on the sampled data points. The bit string of each device substantially matches one another, thereby allowing the electronic devices to share a secret, which may be used to allow secure communications between the at least two electronic devices. | 10-02-2014 |
20140349625 | SYSTEM AND METHOD FOR MOBILE COMMUNICATIONS BLOCKING BASED ON CROWD SOURCED INFORMATION - Systems and techniques are provided for managing and categorizing undesired phone calls and text messages. In a specific implementation, information indicating that an electronic communication received at a mobile communications device of each user in the crowd should belong in a specific category is received from a crowd. If a number of users in the crowd exceeds a threshold value, information identifying the electronic communication is stored in a database as belonging in the specific category. The database is provided to a mobile communications device of a user, where when the electronic communication is transmitted to the mobile communications device of the user, the electronic communication is blocked at the mobile communications device of the user because the electronic communication is in the specific category. | 11-27-2014 |
20140372743 | METHOD AND SYSTEM FOR RENDERING A STOLEN MOBILE COMMUNICATIONS DEVICE INOPERATIVE - A method and system for rendering a stolen mobile communications device inoperative is presented. A determination that the mobile communications device is in a first state is made at a security component on the mobile communications device. A removal of a cryptographic key is affected at the security component on the mobile communications device. | 12-18-2014 |
20140373184 | MOBILE DEVICE PERSISTENT SECURITY MECHANISM - A security application program provides features to help users recover their stolen mobile communication devices. The security application program may be pre-loaded into a system partition of the mobile device so that the security application program will not be erased during a wipe or factory reset of the mobile device. An owner registration service may be provided to help verify ownership of the mobile device. | 12-18-2014 |
20150113666 | PROTECTING DISPLAY OF POTENTIALLY SENSITIVE INFORMATION - The security and privacy of a user is enhanced by distinguishing between potentially sensitive information and non-sensitive information being displayed on a display of a computing device. In an embodiment, potentially sensitive information on a display is identified by parsing information to be displayed. A front-facing camera of the user's computing device is used to monitor the user's background and compare any changes to a threshold amount. In response to a detected change in the background, actions are taken to alert the user or reduce the visibility of identified potentially sensitive information shown on the display screen. | 04-23-2015 |
20150118992 | SYSTEM AND METHOD FOR CREATING AND ASSIGNING A POLICY FOR A MOBILE COMMUNICATIONS DEVICE BASED ON PERSONAL DATA - A system and method to create and assign a policy for a mobile communications device are disclosed. The policy may be created based on personal data associated with the mobile communications device. For example, known sources of personal data on the mobile communications device may be identified and a policy may be created based on the known personal data. The policy may then be used to identify additional personal data associated with the mobile communications device. Thus, the personal data associated with the mobile communications device may be monitored. If an application attempts to access the monitored personal data, the access will be detected. | 04-30-2015 |
20150128205 | METHODS AND SYSTEMS FOR SECURE NETWORK CONNECTIONS - Context information associated with a mobile communications device and a network connection for the mobile communications device is collected. A security policy is applied to determine whether the security offered by the network connection is appropriate for the context. If the security offered by the network connection is not appropriate for the context, the network connection may be made more secure, less secure, or a different network connection having an appropriate level of security may be used for the data associated with the context. | 05-07-2015 |
20150163121 | DISTRIBUTED MONITORING, EVALUATION, AND RESPONSE FOR MULTIPLE DEVICES - Data is collected from a set of devices. The data is associated with the devices, mobile application programs (apps), web applications, users, or combinations of these. A norm is established using the collected data. The norm is compared with data collected from a particular device. If there is a deviation outside of a threshold deviation between the norm and the data collected from the particular device, a response is initiated. | 06-11-2015 |
20150188949 | CLOUD-BASED NETWORK SECURITY - A method for managing the use of gateways on a network includes authenticating a user, determining and managing a path between a user computing device and a destination computing device, the path including at least one of the gateways, and managing user traffic on the path according to a policy associated with the user. | 07-02-2015 |
20150302073 | METHOD AND SYSTEM FOR CROSS-PLATFORM APPLICATION CLONING - A user of electronic devices is provided with a method for providing a compatible version of an application to an electronic device. According to an embodiment, a compatible version of an application in a source electronic device can be installed by a target electronic device. When an application is selected, the source device collects cloning data associated with the selected application. Once the cloning data is collected, the source device transmits the cloning data, at least a portion of which is received by the target electronic device. The target electronic device then utilizes the portion of the cloning data to install a compatible version of the application onto the target electronic device. | 10-22-2015 |
20160066189 | METHODS AND SYSTEMS FOR ADDRESSING MOBILE COMMUNICATIONS DEVICES THAT ARE LOST OR STOLEN BUT NOT YET REPORTED AS SUCH - A method is provided for evaluating the usage of a mobile communications device that itself provides access to a resource. In the method, a detected usage of the mobile communications device is compared to a stored usage pattern of an authorized user. When a measure associated with the difference between the detected usage and the stored usage pattern exceeds a threshold, it is concluded that the mobile communications device is being used by an unauthorized user. In response to this conclusion, a restriction is placed on an ability of the mobile communications device to access the resource. | 03-03-2016 |
20160099963 | METHODS AND SYSTEMS FOR SHARING RISK RESPONSES BETWEEN COLLECTIONS OF MOBILE COMMUNICATIONS DEVICES - Methods are provided for determining an enterprise risk level, for sharing security risk information between enterprises by identifying a security response by a first enterprise and then sharing the security response to a second enterprise when a relationship database profile for the first collection indicates the security response may be shared. Methods are also provided for determining whether to allow a request from an originating device where the request may have been initiated by a remote device. | 04-07-2016 |
Patent application number | Description | Published |
20110309093 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Coupling elements that couple the cup lid to the cup, or that couple containers to the lid cavity may be non-permanent, semi-permanent or permanent. Simplifies eating and drinking from one container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 12-22-2011 |
20120061275 | TOP MOUNTING CAN CONTAINER - Top mounting can container that couples with a can. One or more embodiment enables simultaneous access to both the contents of the can and contents of the container. A half circle cut-out in the lid provides for spill free snacking from an independent vessel. Various configurations enable the inclusion of fresh food, eating and drinking from a straw if desired while standing and walking and access of solid or liquid in the container and can. Coupling elements that couple the top mounting can container to the can, may utilize any type of easily removable or semi-removable technology. Simplifies eating and drinking from one container and can in a theater or stadium having seats for example that provide one beverage holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-15-2012 |
20130056463 | LID WITH INTEGRATED CONTAINER - Lid with integrated container(s) that couples with the top of a cup/can. The lid and cup/can form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup/can without disengagement of the lid from the cup/can. Contents of the lid container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Additionally, an independent drop-in container within the lid cavity may be resealed and removed from the lid cavity and taken to other locations such as home, work, or car. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-07-2013 |
20130056464 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Contents of the lid container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Additionally, an independent drop-in container within the lid cavity may be resealed and removed from the lid cavity and taken to other locations such as home, work, or car. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-07-2013 |
20130056475 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Coupling elements that couple the cup lid to the cup, or that couple containers to the lid cavity may be non-permanent, semi-permanent or permanent. Simplifies eating and drinking from one container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-07-2013 |
20130056476 | TOP MOUNTING CAN CONTAINER - Top mounting can container that couples with a can. One or more embodiment enables simultaneous access to both the contents of the can and contents of the container. A half circle cut-out in the lid provides for spill free snacking from an independent vessel. Various configurations enable the inclusion of fresh food, eating and drinking from a straw if desired while standing and walking and access of solid or liquid in the container and can. Coupling elements that couple the top mounting can container to the can, may utilize any type of easily removable or semi-removable technology. Simplifies eating and drinking from one container and can in a theater or stadium having seats for example that provide one beverage holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-07-2013 |
20130068773 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Contents of the lid container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Additionally, an independent drop-in container within the lid cavity may be resealed and removed from the lid cavity and taken to other locations such as home, work, or car. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-21-2013 |
20130068774 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Contents of the lid container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Additionally, an independent drop-in container within the lid cavity may be resealed and removed from the lid cavity and taken to other locations such as home, work, or car. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 03-21-2013 |
20130119065 | CUP LID WITH INTEGRATED CONTAINER - Cup lid with integrated container(s) that couples with the top of a cup. The cup and cup lid form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup without disengagement of the cup lid from the cup. Contents of the container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Embodiments may employ a one-size-fits-all coupling element to couple any size container to the lower lid that couples with a cup. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 05-16-2013 |
20130228486 | TOP MOUNTING BOTTLE CONTAINER - Top mounting bottle container that couples with a bottle. A tab and cut-out in the cover provides for spill free snacking from an independent removable vessel. Salty snacks such as BEER NUTS® for example may couple to the top of a beer bottle for example. Various configurations enable the inclusion of fresh food, eating and drinking from a straw if desired while standing and walking and simultaneous access of solid or liquid in the container and bottle. Coupling elements that couple the top mounting bottle container to the bottle, may utilize any type of easily removable or semi-removable technology. Simplifies eating and drinking from one container and bottle in a theater or stadium having seats for example that provide one beverage holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 09-05-2013 |
20140231436 | LID WITH INTEGRATED CONTAINER - Lid with integrated container(s) that couples with the top of a cup/can. The lid and cup/can form at least two containment volumes, Embodiments enable easy containment, inclusion of fresh food, transportation and access of solid or liquid in the container and cup/can without disengagement of the lid from the cup/can. Contents of the lid container may be accessed, partially consumed, replaced in the container and resealed at any time as desired by the user. Additionally, an independent drop-in container within the lid cavity may be resealed and removed from the lid cavity and taken to other locations such as home, work, or car. Simplifies eating and drinking from one unified container and cup in a theater or stadium having seats for example that provide one cup-holder per seat. Provides one free hand to hold a child's hand for safety while in stadiums and amusement parks. | 08-21-2014 |
20150327702 | CUP WITH OUTWARDLY PROTRUDING STRAW CHANNEL AND NESTABLE FOOD CONTAINER AND COVER - A cup with an outwardly protruding straw channel and nestable food container and cover that enables simultaneous or intermittent access of the contents of the container and attached cup without disengagement of the food container from the cup, wherein a portion of the cup that holds the food container may be utilized as a fill line when filling liquids into the cup to ensure that insertion of the food container does not result in overflow of liquid from the cup. Additionally, the food container may include at least one cavity that may hold at least one independent drop-in container. A simple domed cover or variable height domed cover may keep food items that are placed within the food container warm. | 11-19-2015 |
20160046415 | CONTAINER LID SYSTEM WITH TAMPER INDICATOR - A container lid system is provided. The system has a lid with a top cover and coupling trough and at least two retaining tabs. When the lid is attached to a beverage container, the retaining tabs travel over the bead rim of the container, and grip the lid onto the beverage container. The lid may be detached from the beverage container by lifting on the retaining tab, and thus permanently deforming the tab such that the deformation indicates that the lid has been tampered with. The lid is constructed such that the retaining tabs have sufficient force to grip the beverage container and form a liquid-tight seal with the beverage container's pressurized contents. The lid's retaining tabs, however, are constructed to bend when a force is applied to them, wherein that force is one that a person can exert with a finger. Thus, the lid can be easily press-fitted onto a container and removed by hand. | 02-18-2016 |
20160051071 | Bendable Safety Straw - A hot liquid straw is disclosed which features a flexible, elongated, hollow body having a continuous noncircular cross section and a length suited for drinking from a beverage container. The straw is dimensioned to regulate flow and remove heat from a hot liquid as it passes through, thereby delivering a volume of the liquid to a user's mouth at a temperature which is safe for consumption. The straw is flexible to allow for safe drinking on the go and for use in various heights of beverage containers. A system for drinking from a beverage container with a lid that accepts a snap-on container is also disclosed, in which the straw is inserted through a hole in the lid. | 02-25-2016 |