Abstract:
Systems, methods, and devices of various embodiments enable autonomous battery vehicles to provide electricity to an electric vehicle. Various embodiments may enable an autonomous battery vehicle to navigate to an electric vehicle, replace an internal battery of the electric vehicle with the autonomous battery vehicle, and provide electricity to the electric vehicle. In some embodiments, an autonomous battery vehicle may be configured to have a dedicated purpose of recharging and/or replacing batteries of electric vehicles. In this manner, an autonomous battery vehicle may in effect be a battery that propels (e.g., drives, flies, etc.) itself.
Abstract:
Methods, systems and devices for presenting rewards to users based on proximity of short-range wireless devices. A wireless identity transmitter may periodically transmit wireless broadcast messages that include obscured identifiers. When within proximity, a proximity broadcast receiver, such as a mobile device carried by a user, may receive and relay the broadcast messages to a server which may process the included information. Based on decrypting the obscured identifiers, the central server may determine whether relayed messages relate to devices associated with a reward program, and may calculate rewards, such as coupons, money, or prizes. Rewards may be presented to users based on sensor data indicated within broadcast messages. In an embodiment, when the server receives a sighting message related to an active search for a target device, a reward is presented to the user of the proximity broadcast receiver that transmitted the sighting message.
Abstract:
Network-initiated uninstallation of programs on remote modules, such as wireless telephones, is performed over a wireless network to recall programs stored on the wireless telephone that are faulty or harmful to the wireless telephone, the wireless network, or a user of the wireless telephone. If one or more recall criteria are met for uninstallation of a targeted application program, a recall command source constructs a recall command. A program manager, using a database containing information about each program downloaded onto each wireless telephone in the network, identifies, for the recall command source, which wireless telephones carry the targeted application program. The recall command includes a unique application identification for the targeted application program and an instruction to the wireless telephone to uninstall the targeted application program. The recall command is broadcast over the wireless network to the wireless telephones. In response to the recall command, the wireless telephone automatically uninstalls the targeted application program by executing a recall program on the wireless telephone.
Abstract:
A mobile computing device is operated to control a vehicle. A digital key for accessing a vehicle is stored for accessing the vehicle. Profile information is associated with the digital key for configuring operation and/or use of a vehicle. The profile information may include one or more outside parameters for implementing one or more pre-entry vehicle configurations. When one or more proximity conditions are detected as being satisfied as between the mobile computing device and the vehicle, a communication is sent to the vehicle in order to cause the vehicle to implement one or more pre-entry vehicle configurations. The communication can be based on the digital key and may specify the one or more outside parameters.
Abstract:
Methods, systems and devices for tracking and handling broadcast devices associated with luggage. A wireless identity transmitter within luggage may periodically transmit wireless broadcast messages that include obscured identifiers. When within proximity, a proximity broadcast receiver, such as a stationary device within an airport, may receive and relay the broadcast messages to a server which may process the included information. Based on decrypting the obscured identifiers, the central server may determine proximity information of devices related to the relayed messages. The proximity broadcast receiver may transmit messages based on whether the wireless identity transmitter should be handled via a luggage service. Additionally, the wireless identity transmitter may activate/deactivate an operational mode for use in an aircraft in response to receiving disable and enable wireless signals from proximate signaling transmitters. After receiving a disable wireless signal, the wireless identity transmitter may not transmit wireless signals until receiving an enable wireless signal.
Abstract:
An applet requiring a virtual machine is downloaded to a wireless device. A software platform on the device determines that a virtual machine is used by the applet during execution. Without additional user interaction, the virtual machine is downloaded to the wireless device. This allows those applets requiring a virtual machine to be used with devices that don't have the virtual machine already installed. Further embodiments include the dynamic loading of a system service when an application is being loaded that used the system service. A unique identifier associated with the system service may be used to determine if determine if the system sercice is loaded.
Abstract:
A method for localizing a mobile station, which in one embodiment is characterized by: logging one or more wireless channels which belong to one or more network providers other than the mobile station's home network provider and which substantially currently provide communication with one or more discernable base stations; and establishing a geographic position of the mobile station by use of the one or more wireless channels which belong to the one or more network providers other than the mobile station's home network provider. In one or more various embodiments, related systems include but are not limited to circuitry and/or programming for effecting the foregoing?referenced method embodiment; the circuitry and/or programming can be virtually any combination of hardware, software, and/or firmware configured to effect the foregoing? referenced method embodiment depending upon the design choices of the system designer.
Abstract:
Network-initiated uninstallation of programs on remote modules, such as wireless telephones, is performed over a wireless network to recall programs stored on the wireless telephone that are faulty or harmful to the wireless telephone, the wireless network, or a user of the wireless telephone. If one or more recall criteria are met for uninstallation of a targeted application program, a recall command source constructs a recall command. A program manager, using a database containing information about each program downloaded onto each wireless telephone in the network, identifies, for the recall command source, which wireless telephones carry the targeted application program. The recall command includes a unique application identification for the targeted application program and an instruction to the wireless telephone to uninstall the targeted application program. The recall command is broadcast over the wireless network to the wireless telephones. In response to the recall command, the wireless telephone automatically uninstalls the targeted application program by executing a recall program on the wireless telephone.
Abstract:
An applet requiring a virtual machine is downloaded to a wireless device. A software platform on the device determines that a virtual machine is used by the applet during execution. Without additional user interaction, the virtual machine is downloaded to the wireless device. This allows those applets requiring a virtual machine to be used with devices that don't have the virtual machine already installed. Further embodiments include the dynamic loading of a system service when an application is being loaded that used the system service. A unique identifier associated with the system service may be used to determine if determine if the system sercice is loaded.
Abstract:
A system and method for associating a mobile computing device with a particular seat in a seating environment. The system collects first sensor data from device sensors of a first mobile computing device based on activity detected within the seating environment. The system then determines, for each of a plurality of seats in the seating environment, a degree of correlation with the mobile computing device based at least in part on the first sensor data, and associates the mobile computing device with the seat, among the plurality of seats, having the highest degree of correlation with the first mobile computing device.