Patent application number | Description | Published |
20080294778 | Network connection manager - Described herein is technology for, among other things, facilitating network communications. It involves various techniques for facilitating network communications by creating virtual named channels which allow applications and thereby users to communicate over a wide variety of networks interfaces without requiring specific knowledge or programming corresponding to the underlying network. Thus, the technology may provide a uniform interface to handle network connections on different types of computing devices and over different types of networks. | 11-27-2008 |
20090100005 | MAPPING NETWORK ADDRESSES TO GEOGRAPHICAL LOCATIONS - A network address mapping system is described. The network address mapping system can identify a set of Web pages, collects information from the Web pages indicating geographical locations (“geolocations”), and correlate the geolocations with the network addresses from which the identified Web pages are served. The collected information can be weighted based on various factors, such as its relative position in a Web page. The collected information can then be used to identify a geolocation. The network mapping system can deduce geolocations for portions of ranges of network addresses based on the score, and can infer geolocations for other portions based on the deduced geolocations. This mapping can then be stored in a database and provided as a geomapping service. The network address mapping system is able to map network addresses to geographical locations. Thereafter, when a user's client computing device accesses a Web server, the Web server can easily and accurately determine a geographical location by querying the database storing the mapping or a geomapping service. | 04-16-2009 |
20100153540 | GEOLOCATION MAPPING OF NETWORK DEVICES - A geographic location of a network device is determined using response delay times from internet servers used as landmarks. A coordination server provides to a client a list of area landmark servers (ALS) with known geographic locations. The client probes ALSs, measures response delays, and provides results to the coordination server. The coordination server then provides to the client a list of additional city landmark servers (CLS) within the area. The client probes the CLSs and provides results to the coordination server which then determines the geographic location of the client. | 06-17-2010 |
20100235881 | Enabling Sharing of Mobile Communication Device - Various exemplary user interfaces, methods and computer program products describe enabling sharing of mobile communication devices. This process utilizes a shared mode for an owner of the mobile communication device to create a virtual environment for a borrower of the mobile communication device, which allows content information (e.g., certain applications and files) to be accessible and visual to the borrower. The process allows an owner of the mobile communication device to track and to manage data created or changed by the borrower. The owner may accept or reject the changes made in the content information. Furthermore, the process conceals non-shared resources to the borrower. | 09-16-2010 |
20140126391 | POWER SAVING WI-FI TETHERING - The techniques discussed herein reduce the power consumption of a Wi-Fi tethering device by switching the Wi-Fi functionality of the Wi-Fi tethering device from a normal operational mode to a sleep mode during idle intervals. The techniques implement a sleep protocol where a Wi-Fi tethering device and the Wi-Fi client device coordinate and establish a sleep schedule. Moreover, the techniques describe a sleep interval adaptation algorithm to establish sleep duration intervals based on data packet exchange patterns associated with different applications executing on the Wi-Fi client device and/or different operations being performed by the Wi-Fi client device. | 05-08-2014 |
20140130150 | CONTENT-BASED ISOLATION FOR COMPUTING DEVICE SECURITY - The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having different ownership, a monitor component identifies and groups trusted portions of the content data into one or more isolation containers such that only trusted programs are permitted access. Other programs are, therefore, untrusted and can be denied access in order to prevent malicious activity, unless access is approved by the content owner. | 05-08-2014 |
20150042287 | AUTOMATED CHARGING - An automated charging device detects a presence of a power-consuming device. The automated charging device may determine whether the power-consuming device is in need of recharging by determining a status of a power level of the power-consuming device. In response to determining that the power-consuming device is due for recharging, the automated charging device may direct a wireless power source to the power-consuming device without user intervention and/or instruction. The automated charging device may detect a location of the power-consuming device and use the detected location to appropriately direct the wireless power source to the power-consuming device. | 02-12-2015 |
20150249674 | CONTENT-BASED ISOLATION FOR COMPUTING DEVICE SECURITY - The subject disclosure is directed towards securing a computing device using content-based isolation. When the computing device requests content data having different ownership, a monitor component identifies and groups trusted portions of the content data into one or more isolation containers such that only trusted programs are permitted access. Other programs are, therefore, untrusted and can be denied access in order to prevent malicious activity, unless access is approved by the content owner. | 09-03-2015 |