Patent application number | Description | Published |
20090002178 | DYNAMIC MOOD SENSING - A system that facilitates personalized sensing is provided. The system includes a sensing component that determines one or more user states based in part on a detected context and a mood component that employs the detected user states to indicate a dynamic condition of a user. | 01-01-2009 |
20090006369 | AUTO-SUMMARY GENERATOR AND FILTER - A system that facilitates data presentation and management is provided. The system includes at least one database to store a corpus of data relating to one or more topics and a summarizer component to automatically determine a subset of the data over the corpus of data relating to at least one of the topic(s), wherein the subset forms a summary of at least one topic. | 01-01-2009 |
20090006551 | DYNAMIC AWARENESS OF PEOPLE - A system for sharing collective information is provided. The system includes a profile component that receives information regarding a user's profile. A detection component determines profiles of other users related to the user's profile and a content component relays data associated with the other users in view of the user's profile. | 01-01-2009 |
20090089569 | MULTI-OS (OPERATING SYSTEM) BOOT VIA MOBILE DEVICE - A system that facilitates different levels of operating system (OS) boot so as to provide users with rapid access to certain mobile device functionalities, security, applications, etc. is provided. An OS can be loaded in phases or stages commensurate with policies, preferences, actions, context, etc. Similarly, a particular OS or group of OSs can be loaded to address a particular scenario or requirement. | 04-02-2009 |
20090171901 | REAL-TIME ANNOTATOR - Systems (and corresponding methodologies) that annotate experience data in real-time are provided. The real-time annotated experience data can be employed in accordance with augmented reality systems which are capable of overlaying virtual data upon real-world data. The system employs ‘smart-tags’ that are capable of identifying data that relates to and/or is associated with the real-world scenarios and situations. | 07-02-2009 |
20090172022 | DYNAMIC STORYBOOK - A system (and corresponding methodology) that dynamically alters a storybook (e.g., literary work). Preferences, policies and contexts can be considered and incorporated into the storyline of the book to enhance interest by creating a rich, personalized experience. By enhancing readability and features (e.g., sensory features), stories become more true-to-life and enjoyable by altering the story over time or to differing context (or content). | 07-02-2009 |
20100093278 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 04-15-2010 |
20110093318 | VIRAL DISTRIBUTION AND TRACKING OF ELECTRONIC COUPONS - Distributing and tracking electronic coupons based on proximity. Upon detecting recipients proximate to a computing device, one or more electronic coupons are selected and transmitted to the detected recipients. The transmittal occurs via a wireless connection in some embodiments. Coupon properties associated with the transmitted coupons are adjusted (e.g., values decreased, expiration conditions modified, location of transmittal, etc.). Distribution data for the transmitted coupons is stored to maintain a distribution history. | 04-21-2011 |
20110225464 | RESILIENT CONNECTIVITY HEALTH MANAGEMENT FRAMEWORK - A framework is provided for diagnosing and resolving wireless connectivity-related issues. For example, some embodiments of the invention provide a “health monitor” which monitors and logs wireless connectivity-related events occurring on the device, the network, and the one or more resources to which the device is connected. The health monitor may analyze these events and/or other information to determine when a connectivity problem may have arisen, and if a problem is determined to be imminent or to have occurred, may initiate recovery procedures. In some embodiments, the monitoring of events, analysis to determine whether a connectivity problem has arisen, and the recovery from the problem occur transparently to the user. | 09-15-2011 |
20110231551 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - A computing device including an indicator predicting use of a network resource. The indicator may provide an indication that a threshold associated with a budget for the network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. An administrative tool is provided for managing network resources and setting budgets for resource consumption by users, devices, or applications. | 09-22-2011 |
20110269444 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20110269445 | MOBILE DEVICE MANNERS PROPAGATION AND COMPLIANCE - The present invention includes methods and technologies for defining and administering device manners policy (“DMP”), propagating DMP, reception and recognition of, and compliance with DMP. Such policy may be used to communicate to various mobile and other devices the “manners” with which compliance is expected or required. Similar to some of the social manners honored among people, such as with “no smoking” or “employees only” zones, “no swimming” or “no flash photography” areas, and scenarios for “please wash your hands” or “no talking out loud”, devices may recognize and comply with analogous “device manners” policy. | 11-03-2011 |
20110287718 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 11-24-2011 |
20120035989 | PERSONALIZATION OF A MOBILE COMMUNCATION DEVICE - An accessory for personalizing a mobile communication device includes an accessory body that is configured to adorn the mobile communication device and at least partially cover its exterior. At least one graphic design is disposed on the exterior surface of the accessory body to convey a theme. A data tag is secured to the accessory. The data tag stores data that facilitates personalization of at least one functionality of the mobile communication device in support of the theme. The data tag being configured so that the data is accessible via a short-range wireless protocol such as the Near-Field Communication (NFC) protocol. | 02-09-2012 |
20120110568 | Viral Application Distribution - Viral application distribution facilitates distribution of an application among users and increases likelihood of downloading the application by the users. A first device may receive information of an application from a second device through a short-range communication channel. The information may comprise identification information of the application without any personally identifiable information of the second device to protect privacy of a user of the second device. A version of the application that is compatible with the first device is determined by searching a catalog using the identification information of the application. The compatible version of the application may then be downloaded or obtained by the first device. Location-based viral distribution may also be performed between devices that visit a location, even at different times. | 05-03-2012 |
20120173620 | CREATION AND MANAGEMENT OF RESILIENT WIRELESS GROUPS - A method and system are disclosed for providing a temporary peer-to-peer network including a group owner, and one or more deputies able to step into the role of group owner to continue the group session in the event the prior group owner cedes ownership. Each device in the group may include a layered communications protocol having a group maintenance layer between the network layer and the physical layer. The group maintenance layer may be responsible for dictating when and under what conditions a deputy device becomes the group owner so that group membership and activities may move forward without loss of continuity. | 07-05-2012 |
20120214414 | PROVISIONING OF WIRELESS CONNECTIVITY FOR DEVICES USING NFC - The claimed subject matter provides a system and/or a method that facilitates connecting a wireless device to a secure network. A device can establish a near field communication link with a verified device on a network, wherein the near field communication link can be a secure and/or encrypted link to provision the device without comprising security constraints within the network. An installation component can invoke the transfer of provisioning data to the network via the near filed communication link to secure a wireless connection for the device to the network. | 08-23-2012 |
20120254420 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 10-04-2012 |
20130115945 | SERVICE-ASSISTED NETWORK ACCESS POINT SELECTION - Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user. | 05-09-2013 |
20130144879 | TRUSTING CROWDSOURCED DATA WITH ISSUED TAGS - Embodiments control submission of crowdsourced data from a computing device to a cloud service. The cloud service receives a packet from the computing device having collected data and a single-use data tag associated therewith. The single-use data tag represents one of a threshold quantity of single-use data tags issued to the computing device. The cloud service validates the single-use data tag in the received packet by, for example, searching for the single-use data tag in a tag store maintained by the cloud service. The collected data from the received packet is stored by the cloud service based on the validation. After validation, the tag store is updated to prevent re-use of the single-use data tag. In some embodiments, the cloud service is a location service receiving crowdsourced beacon fingerprint data from a plurality of mobile computing devices. | 06-06-2013 |
20130182625 | MECHANISM FOR CONNECTING A MOBILE DEVICE TO A NETWORK - A system and method are disclosed for offloading control of services in a mobile device to a non-cellular wireless network, such as Wi-Fi. The described system and method allow the overall connection management to be performed by an application processor, while services are handled in a modem using Wi-Fi connectivity. The Wi-Fi subsystem can be fully driven by the modem for time critical operations allowing the application processor to be off (or in low-power mode) when it is not involved in the delivery of services. Battery power is saved by being able to substantially power down the application processor. | 07-18-2013 |
20130183935 | EXTENSIBLE FRAMEWORK FOR WIRELESS NETWORK CONNECTIVITY - An extensible framework for offloading data traffic sent to a mobile computing device over a cellular network to a wireless network comprises software plugins, a plugin host that is typically part of the mobile device operating system, and plugin interfaces through which the plugin host communicates with the plugins. A plugin is associated with one or more mobile operators. The framework can comprise one or more plugins, but typically, only one plugin is active at a time. The framework can automatically detect and connect to wireless networks associated with a mobile operator associated with an active plugin. The plugin can automatically authenticate the mobile device or a mobile device user with the mobile operator over the connected wireless network. The plugins are not allowed access to operating system functions responsible for detecting and connecting and disconnecting to a wireless network, which can improve mobile operating system stability and battery life. | 07-18-2013 |
20130196615 | RECOMMENDATIONS FOR REDUCING DATA CONSUMPTION BASED ON DATA USAGE PROFILES - Embodiments profile users based on data usage of installed applications and provide recommendations for reducing data usage. A computing device or cloud service determines a plurality of applications installed on the computing device. Data usage patterns associated with each of the determined plurality of applications are identified. The data usage patterns describe data usage over a network for at least one of the determined plurality of applications. One or more recommendations for reducing data usage are defined based on the identified data usage patterns. Some embodiments recommend switching applications, uninstalling applications, or disabling particular network connections. | 08-01-2013 |
20130196616 | DATA USAGE PROFILES FOR USERS AND APPLICATIONS - Embodiments profile users and applications based on network data usage. Data usage statistics are collected and compared for the users and applications. Profiles are assigned to the users and applications based on the comparison. In some embodiments, the applications are ranked based on data usage and presented to the users in an application marketplace. | 08-01-2013 |
20130196617 | PREDICTING NETWORK DATA CONSUMPTION RELATIVE TO DATA USAGE PATTERNS - Embodiments provide interactive prediction of network data consumption. Current data usage statistics are compared with a data usage plan. The current data usage statistics represent network data consumed by at least one computing device of the user. The network data is consumed during at least a portion of a pre-defined time interval of a data usage plan. For the given time interval, one of a plurality of pre-defined data usage states is assigned to the user, such as On Track, Off Track, Over Limit, and Under Track. In some embodiments, the user interacts with the data usage pattern to dynamically adjust for expected future use, which may change the currently assigned data usage state. | 08-01-2013 |
20130196618 | TRACKING DATA USAGE UNDER A SCHEMATIZED DATA PLAN - Embodiments provide a schema for representing data usage plans and data usage statistics. The data usage plan describes threshold values associated with network connections of computing devices of the user. A web service dynamically generates data usage statistics for the computing devices to represent data consumed by the computing devices under the data usage plan. The schema is updated with the data usage statistics and distributed to the computing devices for presentation to the user. | 08-01-2013 |
20130196621 | MANAGING NETWORK DATA TRANSFERS IN VIEW OF MULTIPLE DATA USAGE PLANS - Embodiments manage data transfers using a plurality of data usage plans available to a computing device. Each of the data usage plans has data usage statistics representing an amount of network data consumed under the data usage plan. For each data transfer request received from applications executing on the computing device, a service executing on the computing device or in a cloud defines a network data transfer configuration for performing the data transfer request. The network data transfer configuration is defined based on, for example, the data usage plans, the data usage statistics, and the data transfer request to reduce transfer costs and/or provide a particular quality of service (QoS). | 08-01-2013 |
20130196622 | UPDATING DYNAMIC DATA USAGE PLANS AND STATISTICS - Embodiments enable data usage plans and data usage statistics to be shared among user computing devices. In some embodiments, a web service receives a schema populated with data describing the data usage plan from a mobile operator. The web service distributes the populated schema to the user computing devices, and subsequently distributes updated portions of the schema as the data usage plan is updated by the mobile operator. The web service may also collect the data usage statistics from the user computing devices and the mobile operator, reconcile any differences, and send synchronization notifications to the user computing devices based on the reconciliation. In some embodiments, users are able to view bandwidth consumption by a plurality of user computing devices sharing the same data usage plan. | 08-01-2013 |
20130196626 | DYNAMICALLY ADJUSTING A DATA USAGE PLAN BASED ON DATA USAGE STATISTICS - Embodiments automatically adjust one or more terms of a data usage plan of a user to reduce network transfer costs for the user. Data usage statistics representing network data consumption by at least one computing device of the user are received or collected. The data usage plan is compared with the data usage statistics (e.g., to estimate any excess network transfer costs), and the data usage plan is adjusted accordingly and based on other data usage plans or adjustments that are available. | 08-01-2013 |
20130198373 | MANAGING DATA TRANSFERS OVER NETWORK CONNECTIONS BASED ON PRIORITY AND A DATA USAGE PLAN - Embodiments manage use of different network connections for data transfer in view of priority information and a data usage plan identifying threshold limits associated with the different network connections. A computing device receives data transfer requests from applications executing on the computing device. The data transfer requests have priority information associated therewith. The computing device compares the priority information with available network connections. One or more of the data transfer requests are selected for initiation based on the comparison and on the threshold limits. | 08-01-2013 |
20130198374 | ON-DEVICE ATTRIBUTION OF NETWORK DATA USAGE - Embodiments attribute network data transfers to applications executing on a computing device. A data transfer service executes on the computing device to receive and process data transfer requests. The data transfer requests, populated by the applications, have identifiers attributed thereto to enable monitoring of the network data transfers per identifier. For example, network data transfers associated with different mail accounts of a mail program or different web sites of browser are attributed separately. Data usage statistics relating to the network data transfers for each identifier may be generated and presented to the user for review. | 08-01-2013 |
20130219058 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 08-22-2013 |
20130295872 | MOBILE DEVICE EMERGENCY SERVICE - Mobile device emergency service techniques are described. In embodiments, a client device includes one or more modules implemented at least partially in hardware and configured to implement an emergency service. The emergency service configured to support operations including generating a user interface for display on a display device, receiving one or more inputs usable to form an emergency contacts list that includes a plurality of emergency contacts, and causing the emergency contacts list to be communicated to one or more other client devices for use in generating a message to be communicated automatically and without user intervention to the emergency contacts in the emergency contacts list responsive to a trigger. | 11-07-2013 |
20130303143 | MOBILE DEVICE SAFE DRIVING - In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated. | 11-14-2013 |
20130305354 | RESTRICTED EXECUTION MODES - In embodiments of restricted execution modes, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a shared space user interface of a shared space. The transition to display the shared space user interface is without receiving a PIN code entered on the device lock screen. The mobile device implements a restricted execution service that is implemented to activate a restricted execution mode of the mobile device, and restrict access of a device application to device content while the restricted execution mode is activated. The restricted execution service can also allow a shared device application that is included in the shared space access to the device content while the restricted execution mode is activated. | 11-14-2013 |
20130331028 | Connection Tethering and Service Remoting - Described is a technology by which a target device automatically starts tethering on a source device. A target device sends a request to start tethering to the source device, which responds by starting tethering, independent of needing any user interaction on the source device. While tethering is operational, status messages may be exchanged between the source device and the target device. | 12-12-2013 |
20140071895 | Network Selection Based On Customizing Crowdsourced Connection Quality Data - Embodiments select networks for connection based on application-specific quality scores. A request is received from an application for a network connection. Connection quality data for nearby networks is accessed. The connection quality data is derived from crowdsourced data. The connection quality data is adjusted based on a device context to produce an application-specific quality score for each of the networks. One or more of the networks are selected for connection based on the application-specific quality scores. In some embodiments, a single network connection endpoint is provided to the application to abstract connection management details from the application. | 03-13-2014 |
20140162638 | SERVICE-ASSISTED NETWORK ACCESS POINT SELECTION - Embodiments enable prioritization and selection of network access points (NAP) by a computing device using NAP attribute values. The computing device obtains the attribute values based on a location of the computing device and/or proximate NAPs detected by the computing device. The obtained attribute values are compared to a state of the computing device (e.g., sensor values), user preferences, or other criteria to select at least one of the NAPs for connection with the computing device. In some embodiments, a user of the computing device is presented with a list of Wi-Fi access points ranked according to relevance to the computing device and/or user. | 06-12-2014 |
20140279851 | Fingerprint-Based, Intelligent, Content Pre-Fetching - Example apparatus and methods concern fingerprint-based, intelligent, content pre-fetching. An example apparatus may have a memory that is configured to store content items or fingerprints derived from content items. The apparatus may include a set of logics that are configured to selectively asynchronously provide a content item or a fingerprint derived from the content item to a data store on a mobile computing device. The items are provided in response to an event other than a request for content from the mobile computing device. The apparatus may be configured to select the content item based on a proactive, crowd-sourced, predictive and adaptive method. The apparatus may provide the content item or the fingerprint to the mobile device and to other related mobile devices or users. The apparatus may consider the state (e.g., available memory, available battery, available communication channels) of the mobile device before providing content. | 09-18-2014 |
20150016406 | SYSTEM AND METHOD FOR OFFLOADING TRAFFIC FROM CELLULAR NETWORKS - An extensible framework for offloading data traffic sent to a mobile computing device over a cellular network to a wireless network comprises software plugins, a plugin host that is typically part of the mobile device operating system, and plugin interfaces through which the plugin host communicates with the plugins. A plugin is associated with one or more mobile operators. The framework can comprise one or more plugins, but typically, only one plugin is active at a time. The framework can automatically detect and connect to wireless networks associated with a mobile operator associated with an active plugin. The plugin can automatically authenticate the mobile device or a mobile device user with the mobile operator over the connected wireless network. The plugins are not allowed access to operating system functions responsible for detecting and connecting and disconnecting to a wireless network, which can improve mobile operating system stability and battery life. | 01-15-2015 |
20150074269 | NETWORK RESOURCE MANAGEMENT WITH PREDICTION - An indicator for a device may provide an indication that a threshold associated with a budget for a network resource has or will be reached. When a user requests a network operation that will consume the network resource, an amount of the network resource to be consumed by the operation is predicted, if possible. If the prior use of the network resource and the amount to be used to complete the network operation exceeds a threshold the user may be warned and given an opportunity to cancel the operation or adjust the way in which the operation will be performed. If the amount of network resource a network operation will consume is unknown, a rate of use of the network resource is determined and a time until the budget is reached is estimated. | 03-12-2015 |