Patent application number | Description | Published |
20120077454 | Emergency Override Of Battery Discharge Protection - An apparatus, system and method for overriding battery discharge protection in a mobile communication device in the presence of an emergency communication. The method of overriding battery discharge protection in a mobile communication device comprises determining a measured battery voltage; determining an excess battery discharge condition, wherein further battery discharge will result in an impaired ability to recharge a battery; detecting an emergency communication state; disabling battery discharge protection in response to the emergency communication state; and continuing discharge of the battery. | 03-29-2012 |
20120115430 | Mobile Device Having An Emergency Mode - Disclosed is an apparatus and method to locate a mobile device in an emergency situation. The mobile device includes a display device, a user interface to receive an emergency mode request from a user, and a processor. The processor may be configured to execute instructions to implement an emergency mode process based upon the receipt of the emergency mode request from the user. The emergency mode process is implemented to: monitor received signals to locate a base station, wherein, once a base station is located, a short emergency message is transmitted to the base station including the location of the mobile device. The emergency mode process is further implemented to: monitor received signals to receive an acknowledgement signal from the base station; and reduce a plurality of first non-essential functions of the mobile device to reduce power consumption. | 05-10-2012 |
20120173874 | Method And Apparatus For Protecting Against A Rogue Certificate - Disclosed is a method for protecting against a rogue certificate. In the method, a web client receives a first certificate from a server during an initial session. The first certificate has a first certificate chain to an authority certificate signed by a certificate authority. The web client receives a second certificate during a subsequent session. The second certificate has a second certificate chain to a signed authority certificate. The web client assigns a signature security rating to each chain certificate in the first and second certificate chains. The web client compares the signature security rating of each corresponding chain certificate in the first and second certificate chains. The web client treats the second certificate as insecure if the signature security rating of a chain certificate in the second certificate chain is lowered from that of a corresponding chain certificate in the first certificate chain. | 07-05-2012 |
Patent application number | Description | Published |
20120249341 | Communication of emergency messages with road markers - Disclosed is an apparatus, system, and method to communicate emergency messages utilizing road markers. The road marker may include: a light emitter to emit different light colors; a transmitter; and a receiver to receive an emergency message from an emergency vehicle, a road marker gateway, or another road marker. Further, the road marker may include a processor to: to command the light emitter to emit a light color based upon the emergency message received by the receiver; and command the transmitter to transmit the received emergency message to at least one other road marker. | 10-04-2012 |
20120284511 | Method and Apparatus for Transmitting Bulk Emergency Data while Preserving User Privacy - Systems and methods are described for performing bulk transmissions of information (e.g., emergency information, etc.) while preserving user privacy. An example mobile device described herein includes an information aggregation module configured to compile first information associated with the device, the first information including location-related information, an encryption module communicatively coupled to the information aggregation module and configured to encrypt the first information using at least one session key, and a transmitter communicatively coupled to the encryption module and configured to transmit encrypted first information to at least one receiver prior to a triggering event and to transmit the at least one session key to the at least one receiver after the triggering event. | 11-08-2012 |
20130006868 | METHOD AND APPARATUS FOR DETERMINING AND UTILIZING VALUE OF DIGITAL ASSETS - Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison. | 01-03-2013 |
20130023280 | Wireless Device Secure Tracking - A mobile device includes: a network interface configured to send messages toward, and receive messages from, a communication network wirelessly; and a message module independent of an OS and a BIOS of the mobile device, the message module being configured to produce and provide a location message to the network interface to be sent toward the communication network. The location message contains information that enables at least one of determination or estimation of a location of the mobile device and identification of the mobile device. The message module is configured to provide the location message to the transmitter without use of the operating system or the BIOS. The message module is configured to produce the location message based on a network communication message received at the mobile device through the network interface. | 01-24-2013 |
20140032424 | Method and apparatus for determining and utilizing value of digital assets - Systems and methods for protecting digital assets associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets associated with a device, computing at least one device worth value using the at least one asset worth value assigned to the digital assets associated with the device, identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets associated with the device based on the comparison. | 01-30-2014 |
Patent application number | Description | Published |
20090081948 | Methods and Systems to Provide Automatic Configuration of Wireless Speakers - An apparatus is described that includes an AV receiver with a wireless audio module (WAM) host. The apparatus further includes a plurality of wireless speakers each having a WAM device to enable bi-directional communications with the WAM host. The apparatus further includes a wireless input/output device or a plurality of wireless input/output devices embedded in speakers to enable bidirectional communications with the WAM host in order to automatically configure the plurality of wireless speakers to optimize audio parameters of the wireless speakers. The automatic configuration includes determining a location for each speaker in order to identify each speaker. The automatic configuration further includes setting time delay parameters for each speaker. The automatic configuration further includes setting volume parameters for each speaker. | 03-26-2009 |
20090147471 | SLIDER ASSEMBLY FOR A HOUSING OF A MOBILE COMPUTING DEVICE - A mobile computing device is provided that includes a front housing segment and a back housing segment. The front housing segment includes a first front slot and a first front securement feature or cleat. The back housing segment includes a first back slot and a first securement feature or cleat. The front housing segment and the back housing segment are positioned so that the first back securement feature is received and slideably engaged with the first front slot, and the first front securement feature is received and slideably engaged with the first back cleat. A combination of (i) the first back securement feature being received and slideably engaged with the first front slot, and (ii)the first front securement feature being received and slideably engaged with the first back securement feature, enable the front housing segment and the back housing segment to slide along a path that includes an extended position and a contracted position. As described with one or more embodiments, the path may be arced or otherwise include a radius of curvature. | 06-11-2009 |
20090262080 | INTERFACE FOR INTERACTION WITH DISPLAY VISIBLE FROM BOTH SIDES - A portable viewing and computing apparatus. In one embodiment, the present invention is comprised of a bus, a memory unit coupled to the bus, and a processor coupled to the bus. The memory unit is for storing data and instructions. The processor is for processing data and instructions. The portable viewing and computing apparatus is further comprised of a display device coupled to the bus. The display device is comprised of a viewing panel viewable from a front side and a back side. The portable viewing and computing apparatus is further comprised of a display device controller coupled to the bus. The display device controller is for sensing the orientation and rotation of the display device, and in response thereto, for controlling and rendering data on the display device. | 10-22-2009 |
20140119561 | METHODS AND SYSTEMS TO PROVIDE AUTOMATIC CONFIGURATION OF WIRELESS SPEAKERS - An apparatus is described that includes an AV receiver with a wireless audio module (WAM) host. The apparatus further includes a plurality of wireless speakers each having a WAM device to enable bi-directional communications with the WAM host. The apparatus further includes a wireless input/output device or a plurality of wireless input/output devices embedded in speakers to enable bidirectional communications with the WAM host in order to automatically configure the plurality of wireless speakers to optimize audio parameters of the wireless speakers. The automatic configuration includes determining a location for each speaker in order to identify each speaker. The automatic configuration further includes setting time delay parameters for each speaker. The automatic configuration further includes setting volume parameters for each speaker. | 05-01-2014 |
Patent application number | Description | Published |
20080255905 | Business Systems Management Solution for End-to-End Event Management Using Business System Operational Constraints - The present invention provides a method, apparatus, and computer program product for implementing a business systems management solution for end-to-end event management. The present invention realizes a number of business systems management functionalities, including defining event databases and means for event monitoring and correlating a customer's business functions by using an enterprise view focused on a system of applications, operating systems, connections, and physical components. Together these components make up a business system as defined by the customer. As such, a business system can cross technology platforms, physical space, and comprise multiple applications, or a business system could be limited to a single platform, location, and application. Components that comprise the business system and enterprise-level event management structure are defined, created, and modified to align the Information Technology with the business system's processes and to aid in the management of the information technology with respect to the business system. | 10-16-2008 |
20100158202 | Location Based Emergency Services Dispatching - An embodiment of the invention provides a method for dispatching emergency responders. The method identifies emergency responders proximate an emergency incident site. Of these emergency responders, qualified emergency responders are identified, wherein qualified emergency responders have sufficient resources to service an emergency incident at the emergency incident site. The method identifies travel obstructions between the qualified emergency responders and the emergency incident site. Travel times between each of the qualified emergency responders and the emergency incident site are determined based on the travel obstructions. A first emergency responder is selected from the qualified emergency responders, wherein the first emergency responder has a first travel time that is the shortest travel time of the determined travel times. One or more standby emergency responders are also selected, wherein the standby emergency responders have a second travel time that is the next shortest travel time of the determined travel times. | 06-24-2010 |
20100205605 | SCHEDULING METHOD AND SYSTEM - A scheduling method and system. The method includes receiving by a computing system first data and second data associated with a user. The first data comprises user identification associated, an activity selection for an activity, and first scheduling information. The second data comprises geographical preference data. The computing system determines facilities associated with the activity. The facilities are located within boundaries specified by the geographical preference data. The computing system generates tentative reservations for the user at each facility. The computing system presents the tentative reservations data to the user. The computing system receives verification data from the user. The computing system posts the tentative reservations data in a social networking environment. The computing system stores the tentative reservations data. | 08-12-2010 |
20110106922 | OPTIMIZED EFFICIENT LPAR CAPACITY CONSOLIDATION - A method and system for optimizing a configuration of a set of LPARs and a set of servers that host the LPARs. Configuration data and optimization characteristics are received. By applying the configuration data and optimization characteristics, a best fit of the LPARs into the servers is determined, thereby determining an optimized configuration. The best fit is based on a variant of bin packing or multidimensional bin packing methodology. The optimized configuration is stored. In one embodiment, comparisons of shadow costs are utilized to determine an optimal placement of the LPARs in the servers. LPAR(s) in the set of LPARs are migrated to other server(s) in the set of servers, which results in the LPARs and servers being configured in the optimized configuration. | 05-05-2011 |