Patent application number | Description | Published |
20090216105 | BLOOD GLUCOSE TRACKING APPARATUS AND METHODS - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 08-27-2009 |
20100122074 | Blood Glucose Tracking Apparatus and Methods - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 05-13-2010 |
20110119074 | PDA BASED SYSTEM FOR MANAGING TREATMENT OF A PATIENT HEALTH CONDITION - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 05-19-2011 |
20110119086 | SYSTEM FOR MANAGING TREATMENT OF A PARTICULAR HEALTH CONDITION VIA A MOBILE PHONE DEVICE - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 05-19-2011 |
20110119087 | SYSTEM FOR MANAGING TREATMENT OF A PARTICULAR HEALTH CONDITION THAT INCLUDES GRAPHING ACCUMULATED DATA - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 05-19-2011 |
20110125530 | CENTRAL SERVER SYSTEM FOR COLLECTING PATIENT HEALTH CONDITION MANAGEMENT DATA - A measurement module for glucose testing includes a glucose testing measurement module housing, a test strip receptacle formed in the housing, and a connector portion formed in the housing and shaped to permit mechanical removable attachment of the housing to a hand-held computer. Electronics determine the amount of glucose present in a sample of body fluid, when the test strip is positioned in the receptacle and the body fluid is placed on a test strip, and communicate the glucose amount to the hand-held computer via the connector portion. | 05-26-2011 |
20120271794 | METHOD FOR MANAGING TREATMENT OF A PATIENT HEALTH CONDITION WITH A PDA BASED SYSTEM - A method for managing treatment of a particular health condition afflicting a patient through the use of a PDA which includes a health management program stored in the PDA that prompts a user for entry of health condition data, including patient physiological data, subjective patient health condition data, and medication delivery data, compiles the health condition data into an accumulated data summary, and transmits the data summary from the PDA to a second processing unit through a communication port. A drop-down list related to subjective symptoms is provided, which includes stress and depression. A touch screen is provided for a graphical user interface. The health management program also provides prompts for the entry of diet data, and further displays drop-down lists related to daily activities and alerts for medication delivery. | 10-25-2012 |
20120330679 | METHOD FOR COLLECTING PATIENT HEALTH CONDITION MANAGEMENT DATA AT A CENTRAL SERVER SYSTEM - A method for managing treatment of a particular health condition afflicting a patient through connection of a patient local processing device with a remote web server system. The patient local processing device receives patient health condition data, such as subjective patient symptoms and analyte levels, compiles the data into summaries to correlate subjective symptoms to analyte levels. The web server automatically provides patient reports to a healthcare provider. | 12-27-2012 |
20120331413 | METHOD FOR MANAGING TREATMENT OF A PARTICULAR HEALTH CONDITION THAT INCLUDES GRAPHING ACCUMULATED DATA - A method for managing treatment of a particular health condition afflicting a patient through associating subjective patient symptoms with analyte levels, which includes storing a health management program in a nonvolatile memory, which when run, prompts a user for entry of health condition data, including patient physiological data, subjective patient health condition data, and medication delivery data, compiles the health condition data into an accumulated data summary in which analyte levels at specific times are associated with subjective patient symptom data at specific times so that the summary shows an overall view of possible influences of subjective patient symptoms on analyte levels. | 12-27-2012 |
20130012797 | METHOD FOR MANAGING TREATMENT OF A PARTICULAR HEALTH CONDITION VIA A MOBILE PHONE DEVICE - A method for managing treatment of a particular health condition afflicting a patient through the use of a mobile phone device which includes a health management program stored in the mobile phone device that prompts a user for entry of health condition data, including patient physiological data, subjective patient health condition data, and medication delivery data, compiles the health condition data into an accumulated data summary, and transmits the data summary from the mobile phone device to a second processing unit through a communication port. A drop-down list related to subjective symptoms is provided, which includes stress and depression. A touch screen is provided for a graphical user interface. The health management program also provides prompts for the entry of diet data, and further displays drop-down lists related to daily activities and alerts for medication delivery. | 01-10-2013 |
20140012602 | SYSTEM FOR MANAGING TREATMENT OF A PARTICULAR HEALTH CONDITION - A system for managing treatment of a particular health condition afflicting a patient includes a health management application program that prompts a user for entry of health condition data, including patient physiological data, subjective patient health condition data, and medication delivery data, compiles the health condition data into a data summary, and transmits the data summary through a communication unit. A drop-down list related to subjective symptoms is provided, which includes stress and depression. A touch screen is provided for a graphical user interface. The health management program also provides prompts for the entry of diet data, and further displays drop-down lists related to daily activities and alerts for medication delivery. | 01-09-2014 |
Patent application number | Description | Published |
20090170432 | SERVICE PROVISIONING UTILIZING NEAR FIELD COMMUNICATION - Embodiments of the present invention provide methods, apparatuses, and programming instructions configured to enable a device to receive provisioning data over a Near Field Communication link, and utilize the provisioning data to receive services. | 07-02-2009 |
20090239469 | TECHNIQUES FOR DISCOVERING SERVICES PROVIDED IN A WIRELESS NETWORK - An embodiment of the present invention provides a method for discovering services provided in a wireless network, comprising enabling devices equipped with radio interfaces to advertise the services it provides and discover services offered by other nearby devices without establishing a network connection with the devices. | 09-24-2009 |
20090240794 | TECHNIQUES UTILIZING A LAYER-2 PROXY FOR ENERGY-EFFICIENT SERVICE DISCOVERY AND CONNECTIVITY IN NETWORKS - An embodiment of the present invention provides a method of server energy conservation in networks, comprising integrating a layer-2 service discovery proxy with an access point (AP) in the network, wherein the AP advertises the services on behalf of servers in the network to enable the servers to go to a low power state and conserve energy. | 09-24-2009 |
20100254286 | TECHNIQUES FOR DISCOVERING SERVICES PROVIDED IN A WIRELESS NETWORK - An embodiment of the present invention provides a method for discovering services provided in a wireless network, comprising enabling devices equipped with radio interfaces to advertise the services it provides and discover services offered by other nearby devices without establishing a network connection with the devices. | 10-07-2010 |
20110287716 | SERVICE PROVISIONING UTILIZING NEAR FIELD COMMUNICATION - Embodiments of the present invention provide methods, apparatuses, and programming instructions configured to enable a device to receive provisioning data over a Near Field Communication link, and utilize the provisioning data to receive services. | 11-24-2011 |
20120254960 | Connecting mobile devices, internet-connected vehicles, and cloud services - A three-way trust relationship is established between a mobile device, Internet-connected vehicle system, and a cloud-based service. Access rights are granted to the mobile device from the vehicle system, such that the mobile device can securely connect to, and obtain status information and/or control the Internet-connected vehicle system, through the cloud-based service. | 10-04-2012 |
20130263084 | Automatic Code Generation for Crowdsourced Automatic Data Collection - An automatic code generator that may be located at a server may generate code to handle crowdsourced data. The crowdsourced data may come from members of the public using automatic data collection technology on mobile devices, in one embodiment. | 10-03-2013 |
20130317916 | LOCATION BASED TECHNOLOGY FOR SMART SHOPPING SERVICES - A method can include a mobile device, of a user determining location information corresponding to the mobile device within an establishment and communicating with a smart shopping infrastructure. The communicating may include providing the smart shopping infrastructure with the location information. The method can further include cross-referencing the location information with inventory information to determine a first location within the establishment where the mobile device is currently situated, and providing the mobile device with at least one smart shopping service based at least in part on the cross-referencing. | 11-28-2013 |
Patent application number | Description | Published |
20090282242 | METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS FOR SIGNED XML - A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access. | 11-12-2009 |
20100246502 | COMBINED DEVICE AND SERVICE DISCOVERY TECHNIQUE IN STATIONS SUPPORTING TUNNELED DIRECT LINK SETUP (TDLS) - A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer- | 09-30-2010 |
20120096522 | METHOD FOR ASSEMBLING AUTHORIZATION CERTIFICATE CHAINS FOR SIGNED XML - A method for assembling authorization certificate chains among an authorizer, a client, and a third party allows the client to retain control over third party access. The client stores a first certificate from the authorizer providing access to a protected resource and delegates some or all of the privileges in the first certificate to the third party in a second certificate. The client stores a universal resource identifier (URI) associated with both the first certificate and the third party and provides the second certificate and the URI to the third party. The third party requests access to the protected resource by providing the second certificate and the URI, without knowledge or possession of the first certificate. When the authorizer accesses the URI, the client provides the first certificate to the authorizer, so that the client retains control over the third party's access. | 04-19-2012 |
20120185696 | DEVICE INTRODUCTION AND ACCESS CONTROL FRAMEWORK - In an embodiment, a method includes registering applications and network services for notification of an out-of-band introduction, and using the out-of-band introduction to bootstrap secure in-band provisioning of credentials and policies that are used to control subsequent access and resource sharing on an in-band channel. In another embodiment, an apparatus implements the method. | 07-19-2012 |
20120252405 | Connecting mobile devices, internet-connected hosts, and cloud services - Applications are downloaded to a device from a cloud-based service by establishing trust with between the device and a host system. The host system and the cloud-based service have a pre-existing trust relationship. | 10-04-2012 |
20120300683 | COMBINED DEVICE AND SERVICE DISCOVERY TECHNIQUE IN STATIONS SUPPORTING TUNNELED DIRECT LINK SETUP (TDLS) - A tunneled direct link set-up (TDLS) capable wireless network may comprise a router such as an access point (AP) and a plurality of stations (STA) including service consumer and service provider station. A service consumer station may generate and send a layer-2 query frame to the plurality of stations. A service provider station may generate a layer-2 service frame in response to receiving the layer-2 query frame. The service consumer station may discover the service provider station and the services offered by the service provider station based on the layer-2 service frame. Also, the service consumer may discover the service provider station using layer-2 query frame and may discover the services offered by the service provider station using higher layer service discovery procedure. | 11-29-2012 |
20130144628 | VOICE INTERFACE TO NFC APPLICATIONS - Technologies for transferring Near Field Communications information on a computing device include storing information corresponding to services in a database on the computing device, receiving a voice input corresponding to a name of a requested service, and retrieving the information corresponding to the requested service from the database. Such technologies may also include loading the retrieved information corresponding to the requested service into a Near Field Communications tag emulated by the computing device and transferring the retrieved information to a portable computing device in response to the Near Field Communications tag being touched by a Near Field Communications reader of the portable computing device. The information corresponding to the requested service stored in the database, retrieved from the database, loaded into the Near Field Communications tag, and/or transferred to the portable computing device may include a Universal Resource Identifier and content-specific keywords corresponding to the requested service. | 06-06-2013 |
20130257631 | Automated Driver Alert System - In accordance with some embodiments, an automated system may be implemented in which alerts to drivers are automatically distributed and implemented at the driver's vehicle. Thus, in some embodiments, no involvement by the driver is needed and everything may be done in an automated fashion including filtering alerts and responding to alerts. In some embodiments, each vehicle need not provide its current location to the Amber Alert System, providing greater privacy in some cases. | 10-03-2013 |
20130262208 | Peer-to-Peer Distribution of Advertising - Advertising may be distributed over a location based peer-to-peer network. A first customer may send a received advertisement to other customers over a short range distribution system in some embodiments. An identifier of the first customer may be appended to the transmission. The identifier may be used to reward the first customer for the referral. | 10-03-2013 |
20130311766 | ESTABLISHING NETWORK SECURITY USING INTERNET PROTOCOL SECURITY POLICIES - Techniques for configuring network security include obtaining non-packet flow information, evaluating a policy rule based on the obtained information, and proposing a security arrangement based on the evaluation. The non-packet flow information can include, for example, authentication information obtained during an Internet Key Exchange protocol session or information obtained from a layered service provider. Therefore, policies such as Internet Protocol security (IPsec) policies can be defined and implemented so that they more accurately reflect the network's security requirements. | 11-21-2013 |
20140001265 | METHOD AND SYSTEM FOR DECODING SMALL SIZED BARCODES FROM BLURRED IMAGES | 01-02-2014 |
20140003655 | METHOD, APPARATUS AND SYSTEM FOR PROVIDING IMAGE DATA TO REPRESENT INVENTORY | 01-02-2014 |
20140003727 | IMAGE-AUGMENTED INVENTORY MANAGEMENT AND WAYFINDING | 01-02-2014 |
20140033319 | Collecting Data from Processor-Based Devices - In accordance with some embodiments, information may be collected from processor-based devices after the processor-based devices have already been deployed. Moreover, in some cases, the information that is to be collected, the collection sources, and the handling of the data may be specified after the processor-based devices have already been deployed. | 01-30-2014 |
20140045464 | METHOD AND APPARATUS TO USE SMART PHONES TO SECURELY AND CONVENIENTLY MONITOR INTEL PCS REMOTELY - Techniques for monitoring information technology (IT) assets using mobile devices are described herein. The mobile device is configured to wirelessly communicate with the IT asset using a near field communications (NFC) standard used to communicate over short distances. The IT asset is configured to include a monitoring device that is operable in a low power mode as well as in a normal power mode to monitor security related parameters. An alarm is generated in response to detecting a breach in security of the IT asset and the mobile device is notified of the alarm. A user may use the mobile device to send an encrypted message to the IT asset and instruct it to operate in a lockout mode, thereby protecting the digital assets accessible via the IT asset from unauthorized use. | 02-13-2014 |
20140058583 | Event Data Recording for Vehicles - In accordance with some embodiments, in response to the detection of a particular event, an event data recorder may enter a secure mode. In the secure mode, data from various peripherals is collected over a secure channel and stored in a secure memory within the event data recorder. That data may subsequently be read out under secure conditions with an assurance of reliability while the system is in a secure mode, it may continue to collect data in a non-secure mode in parallel. | 02-27-2014 |
20140059694 | Privacy-Enhanced Car Data Distribution - In accordance with some embodiments, data may be collected from vehicles, and then reported to various subscribers with different levels of access privileges and pursuant different levels of security. In some embodiments, the data may be authenticated by a cloud service without revealing the identity of vehicle owner. This may provide enhanced privacy. At the same time, some types of the data may be encrypted for security and privacy reasons. Different information may be provided under different circumstances to different subscribers, such as the government, family members, location based services providers, etc. | 02-27-2014 |
20140081860 | NEAR FIELD CONTACTLESS SYSTEM AND METHOD FOR ONLINE TRANSACTIONS - Systems, methods, and apparatuses are directed to conducting online transactions by virtue of a near field communication (NFC) reading mechanism configured to contactlessly read NFC-compliant provisioning information including a monetary value. Moreover, logic is configured to initiate establishment of a communication link, automatically send a request message to confirm the read provisioning information via the communication link, store at least a portion of the provisioning information in a secure memory unit, and based on the confirmation of the provisioning information, automatically present on a display unit, the monetary value, selectable transaction options, and an online information resource link to accommodate execution of a selected transaction option. | 03-20-2014 |
20140139670 | AUGMENTING ADAS FEATURES OF A VEHICLE WITH IMAGE PROCESSING SUPPORT IN ON-BOARD VEHICLE PLATFORM - Systems and methods directed to augmenting advanced driver assistance systems (ADAS) features of a vehicle with image processing support in on-board vehicle platform are described herein. Images may be received from one or more image sensors associated with an ADAS of a vehicle. The received images may be processed. An action is determined based upon, at least in part, the processed images. A message is transmitted to an ADAS controller responsive to the determination. | 05-22-2014 |
20140142948 | SYSTEMS AND METHODS FOR IN-VEHICLE CONTEXT FORMATION - Systems, methods, and computer program products directed to in-vehicle context formation are described. Data from one or more sources associated with a vehicle may be received. Context information may be identified, based upon, at least in part, the received data. Audio captured from the vehicle may be received. The context information may be processed based upon, at least in part, at least one of the data from the one or more sources or the received audio. | 05-22-2014 |
20140187149 | URI-BASED HOST TO MOBILE DEVICE SETUP AND PAIRING - Systems and methods directed to URI-based host to mobile device setup and pairing are described herein. A uniform resource identifier (URI) may be received from a host device. A request for an application associated with the host device and the wireless device may be transmitted based at least in part on the URI. The requested application may be received. An association with the host device may be established based at least in part on the application. | 07-03-2014 |
20140195808 | SECURE MESSAGE FILTERING TO VEHICLE ELECTRONIC CONTROL UNITS WITH SECURE PROVISIONING OF MESSAGE FILTERING RULES - A method according to one embodiment includes the operations of configuring a host processor to receive a message filtering rule, the host processor associated with a vehicle; configuring a bus controller to verify authenticity of the message filtering rule, wherein the bus controller is programmed through an interface, the interface inaccessible from the host processor; filtering messages from the host processor using the verified message filtering rule, wherein the filtering is performed by the bus controller; and transmitting the filtered messages from the bus controller over a bus to one or more electronic control units (ECUs), the ECUs communicatively coupled to the bus. | 07-10-2014 |
20140196111 | SECURED ELECTRONIC DEVICE - Methods, systems, and apparatus for communicatively pairing and securing an electronic device to a vehicle based electronic system. The pairing can enable the electronic device to seamlessly communicate with the electronic device and can provide infotainment to users of the vehicle. | 07-10-2014 |
20140200737 | USER IDENTIFICATION AND PERSONALIZED VEHICLE SETTINGS MANAGEMENT SYSTEM - A system and method for identifying an occupant of a vehicle as an authorized user and managing settings and configurations of vehicle components based on personal preferences of the authorized user includes detecting occupant characteristics from multiple sensors, determining whether the occupant is an authorized user of the vehicle based on a comparison of the occupant characteristics with a user database including registered user profiles, and automatically adjusting vehicle cabin and/or control components based on personal preferences of the occupant identified as a registered user. | 07-17-2014 |
20140222341 | Managing Navigation Changes - In accordance with some embodiments, multiple navigation changes to a navigation system may be managed. The navigation system may receive and first set of navigation changes. Then, the navigation system may establish communication with a user device. The navigation system may then receive a second set of navigation changes associated with the user device. As a result, the navigation system may merge the first set of navigation changes with the second set of navigation changes. | 08-07-2014 |
20140244259 | SPEECH RECOGNITION UTILIZING A DYNAMIC SET OF GRAMMAR ELEMENTS - Speech recognition is performed utilizing a dynamically maintained set of grammar elements. A plurality of grammar elements may be identified, and the grammar elements may be ordered based at least in part upon contextual information. In other words, contextual information may be utilized to bias speech recognition. Once a speech input is received, the ordered plurality of grammar elements may be evaluated, and a correspondence between the received speech input and a grammar element included in the plurality of grammar elements may be determined. | 08-28-2014 |
20140295754 | MULTI-RADIO WIRELESS FLASH DRIVE USING NFC - A wireless flash drive may use a Near Field Communication (NFC) radio link with a second device to establish a second, non-NFC, radio link with the second device, and then use the non-NFC link to wirelessly transfer data between the second device and the non-volatile memory in the flash drive. Some embodiments may also have other features, such as a switch to activate the non-NFC link without using the NFC link, a battery to power the non-NFC radio and the non-volatile memory, inductive charging circuitry to wirelessly recharge the battery, or instructions to be uploaded to the second device for use in establishing the non-NFC link. | 10-02-2014 |