Patents Assigned to MOBILE TECHNOLOGIES, INC.
-
Publication number: 20140168884Abstract: A docking station for a tablet device includes a security frame that is releasably connected to a pedestal. An upper head portion of the pedestal is rotatable through three degrees of freedom to allow for angular adjustment of the frame as it retains a tablet device. Electrical conductivity is maintained through the rotational connection.Type: ApplicationFiled: December 4, 2013Publication date: June 19, 2014Applicant: MOBILE TECHNOLOGIES, INC.Inventor: Hunter Wylie
-
Publication number: 20140159898Abstract: The invention disclosed here is a display system for managing power and security for a plurality of hand-held electronic devices sold to consumers in a retail location. The display includes features that allow power to be supplied to individual devices and security sensors without continuous hard wiring or multi-conductor retractor cables. The display also allows for individual security alarms to be triggered when a theft occurs. Security alarm conditions are preferably triggered via wireless signals.Type: ApplicationFiled: November 27, 2013Publication date: June 12, 2014Applicant: MOBILE TECHNOLOGIES, INC.Inventors: Wade Wheeler, Ron Peters
-
Publication number: 20120317155Abstract: A hybrid data management/storage system is provided which includes two or more integrated or connected data management systems. An external application and/or user interacts with the hybrid data management/storage system using a unified interface. Incoming raw data may be directed to be stored in any of a plurality of data management systems based on the incoming data object having one or more of a number of predefined characteristics, including for example size and/or data type. Metadata corresponding to all incoming data objects may be stored in a particular data store, regardless of whether the incoming object's raw data is stored in a different one of the plurality of data stores.Type: ApplicationFiled: June 9, 2011Publication date: December 13, 2012Applicant: GEMINI MOBILE TECHNOLOGIES, INC.Inventors: Gary Hayato Ogasawara, Michael M. Tso
-
Publication number: 20080233996Abstract: A handheld device user may engage in motion-based communication with a target user over a wireless network. In one embodiment, a plurality of movements are associated with a plurality of corresponding communications. Upon detection of a handheld device motion, a determination may be made as to whether the handheld device motion corresponds to one of the known movements. If so, one of the plurality of corresponding communications may be sent to the target user over the wireless network.Type: ApplicationFiled: March 19, 2007Publication date: September 25, 2008Applicant: GEMINI MOBILE TECHNOLOGIES, INC.Inventors: Gary Hayato Ogasawara, Joseph Wayne Norton
-
Publication number: 20080134347Abstract: A system transfers applications and datasets (files) from a server to a client device and assigns to each file a lease key that will expire at a specified time. A file cannot be accessed unless its lease key is validated. Upon expiration of a lease key, the client device will connect to the server to determine if the lease key may be renewed. If the lease key may be renewed, a new lease key is created and access to the associated application or dataset is restored. If the lease key may not be renewed, the file may be deleted or rendered inaccessible. If rendered inaccessible, the file may be restored in the future without having to re-transmit it from the server to the client device. The server may also revoke a lease key before it expires.Type: ApplicationFiled: August 9, 2007Publication date: June 5, 2008Applicant: VAULTUS MOBILE TECHNOLOGIES, INC.Inventors: Arvind Goyal, Joseph George, Howard Mak
-
Publication number: 20070162862Abstract: A subject user may selectively monitor one or more other users in an online environment. In one embodiment, a subject user may access a directory of available online users that are located within a particular predefined portion of the online environment. The order of the available online users in the directory may be based on at least one of the subject user's preferences and profile data. The subject user may then select a subset of the available online users from this directory. The subject user may receive periodically-updated information regarding the selected subset of available online users. In one embodiment, this may include information on the selected user(s) location, profile, status and/or actions.Type: ApplicationFiled: March 9, 2007Publication date: July 12, 2007Applicant: GEMINI MOBILE TECHNOLOGIES, INC.Inventors: Gary Ogasawara, Joseph Norton
-
Publication number: 20070156664Abstract: A subject user may be automatically matched to one or more other users in an online resource-limited environment. In one embodiment, a multi-user online environment is accessed using a resource-limited device operated by the subject user. A pool of candidates from the available online users may then be generated based on their proximity in the online environment to the subject user. The various candidates within this pool may then be ranked based on a comparison of user profile matching criteria. Candidates may then be selectively added to the subject user's interaction group, which in one embodiment represents the set of online users which will be “seen” or otherwise available to the subject user for possible interaction.Type: ApplicationFiled: March 9, 2007Publication date: July 5, 2007Applicant: GEMINI MOBILE TECHNOLOGIES, INC.Inventors: Joseph Norton, Thomas O'Dowd, Shoji Ishida, Gary Ogasawara, Takuya Kamakura
-
Publication number: 20040139148Abstract: A system and method of managing a network provides for distributed storage and retrieval. In one embodiment, information such as a text message is stored by calculating an actual destination node based on a subscriber identifier and a current addressing function, which corresponds to a current topology of a network. The message is sent to the actual destination node for storage. Messages can be retrieved by calculating a plurality of destination nodes based on a subscriber identifier and a plurality of addressing functions, where each addressing corresponds to a topology of the network at a particular moment in time. In one embodiment, the addressing functions are hash functions.Type: ApplicationFiled: October 17, 2003Publication date: July 15, 2004Applicant: GEMINI MOBILE TECHNOLOGIES, INC.Inventors: Joseph Wayne Norton, Gary Hayato Ogasawara, Jonan Schwartz, David Stone, Michael Man-Hak Tso