Abstract:
A system, method and apparatus are disclosed for monitoring a mobile device en route to a destination. A user of a monitored device specifies geo-fence regions along a route to the destination. Entry and exit of regions triggers the sending of event notifications to a monitoring device. Event notifications may be sent if an estimated time of arrival changes due to delay. Event notifications may be sent if the monitored device deviates from a planned route by a threshold distance. Event notifications may be sent through a direct communication link between the monitored device and monitoring device or through a location-based service.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for retrieving local information on a user device include detecting itinerary information stored by a first application on a user device, and identifying a travel destination based on the detected itinerary information. The travel destination is communicated to a second application executable on a user device, and the travel destination is stored in association with the second application. The second application is adapted to retrieve local information based on an identified geographic location, and local information for the travel destination is provided through the second application in response to a user interaction with the second application and based on a triggering threshold associated with the itinerary information.
Abstract:
A mobile device can obtain wireless network signal strength map data that indicates, for various nearby geographical regions, the wireless network signal strength in each such region. A mobile device can transmit that data to a vehicular navigation system responsible for automatically selecting a high-quality route of vehicular travel between a specified source and destination. The system can take the wireless network signal map data into account when selecting that route. When selecting from among multiple different routes of vehicular travel between a specified source and destination, the system may employ an algorithm that considers wireless network signal strengths along those routes, in addition to the other factors. Consequently, the system can select a longer route having better signal strength over a shorter route having worse signal strength. The system can present the selected route within a set of suggested routes, potentially along with reasons for each route's suggestion.
Abstract:
Disclosed herein is a technique for preventing words from spanning across message blocks of a short message service (SMS) message. An SMS message is generated at a source wireless device, and an SMS manager, executing on the source wireless device, determines whether any words in the SMS message span across two or more message blocks of the SMS message. When so determined, the SMS manager attempts to shift characters of the SMS message across the message blocks to eliminate any word spanning. When the attempt to shift the characters between message blocks requires at least one additional message block to transmit the complete SMS message, the SMS manager gathers information about the destination wireless device to determine whether it is necessary to carry out the aforementioned shifting prior to sending the message blocks. The SMS manager then transmits the message blocks either unmodified or modified (i.e., shifted).
Abstract:
A telephone number corresponding to an incoming telephone call may be utilized to obtain information associated with the incoming call. If it is determined that the telephone number does not match records stored on the device on which the call is received, a request may be sent from the receiving device to an external device to obtain information associated with the incoming call. The request may be directed to a remote contacts application, another device listed in a data store of the receiving device, or to the calling device itself. When a response is received, the information may be displayed or otherwise utilized by the receiving device.
Abstract:
Techniques are described for seamlessly transitioning from a map that displays out-of-doors elements to a map that displays indoor elements, in response to detecting a transition event. The transition event may be, for example, that a navigation system that is generating the out-of-doors map has moved to an indoors location. Techniques are also provided for navigating to a parking spot in a parking structure. Specifically, users may search for parking spots that satisfy specific criteria. The search for a parking spot that satisfies the criteria may be initiated at the time a trip begins, or may be automatically triggered by some event. For example, a search for available parking spots near a designated destination may be automatically initiated as a user comes within a predetermined distance of the designated destination.
Abstract:
A mobile computing device can be used to locate a vehicle parking location in weak location signal scenarios (e.g., weak, unreliable, or unavailable GPS or other location technology). In particular, the mobile device can determine when a vehicle in which the mobile device is located has entered into a parked state. GPS or other primary location technology may be unavailable at the time the mobile device entered into a parked state (e.g., inside a parking structure). The location of the mobile device at a time corresponding to when the vehicle is identified as being parked can be determined using the first location technology as supplemented with sensor data of the mobile device. After the location of the mobile device at a time corresponding to when the vehicle is identified as being parked is determined, the determined location can be associated with an identifier for the current parking location.
Abstract:
A method for management of multiple radio links for a wireless peer-to-peer (P2P) session is disclosed. The method can include a wireless communication device providing interface address information for a first radio interface and a second radio interface implemented on the wireless communication device to a peer device when establishing a wireless P2P session with the peer device; establishing a threshold for transitioning between the first radio interface and the second radio interface during the wireless P2P session; determining during the wireless P2P session that the threshold has been met; and in response to the threshold being met, signaling to the peer device to transition to the second radio interface, and using the second radio interface to continue the wireless P2P session.
Abstract:
A processor-based personal electronic device (such as a smartphone) is programmed to automatically respond to data sent by various sensors from which the user's activity may be inferred. One or more of the sensors may be worn by the user and remote from the device. A wireless communication link may be used by the device to obtain remote sensor data. Data from on-board sensors in the device—such as motion sensors, location sensors, and the like—may also be used to deduce the user's current activity. In one embodiment, an extended period of inactivity triggers a reminder to the user to get up, stretch and move about. In other embodiments, transitions in a user's activity level may be used to trigger reminders and/or set the state of the device (such as a Do Not Disturb state wherein notifications and alarms are suppressed).
Abstract:
A processor-based personal electronic device (such as a smartphone) is programmed to automatically respond to data sent by various sensors from which the user's activity may be inferred. One or more alarms on the device may be temporarily disabled when sensor data indicates that the user is asleep. One or more of the sensors may be worn by the user and remote from the device. A wireless communication link may be used by the device to obtain remote sensor data. Data from on-board sensors in the device—such as motion sensors, location sensors, ambient light sensors, and the like—may also be used to deduce the user's current activity. User data (such as calendar entries) may also be used to determine likely user activity and set alarms accordingly. Biometric data from a second, nearby person may also be used to automatically select certain alarm modes on a first person's device.