Software

Web-Based Game Platform With Mobile Device Motion Sensor Input

(text only version)

 Patent  No. 9,022,870

Abstract

A distributed gaming platform is provided wherein mobile devices (e.g., a smartphone) with motion sensors are used as input controllers of a game. A cloud-based gaming rules engine manages multiple players and the content for display in the game. The game output is displayed on any web-enabled display which is physically distinct from the mobile device. Multiple players may simultaneously play the same game, or different games, in multiple geographic locations.

Inventor(s): Jeffery; Mark John (Mesa, AZ), Komorous-King; Robert Sunshin (Berkeley, CA), Rana; Manoj (Naperville, IL)

Assignee: Aquimo LLC, Mesa AZ

 

Method and System to Analyze Sports Motions Using Motion Sensors of a Mobile Device

(text only version)

 Patent  No. 9,101,812

Abstract

A method and system to analyze sports motions using the motion sensors of a mobile device, such as a smart phone, is provided. This method uses the mobile device motion sensor output to define the impact point with a virtual object, such as a golf ball, baseball or tennis ball. The motion sensor signature of the sports motion is analyzed for characteristics, specific to each type of sports motion. A method is disclosed using multiple sensors outputs in a mobile device to compute the impact point with a virtual object, such as a golf ball, baseball, tennis ball. Further, a method is disclosed where moving virtual sports objects interact with virtual sports motions and the responsive outputs are displayed on the mobile device and/or any Web-enabled display device.

Inventor(s): Jeffery; Mark John (Mesa, AZ), Komorous-King; Robert Sunshin (Berkeley, CA), Rana; Manoj (Naperville, IL)

Assignee: Aquimo LLC, Mesa AZ

 

Secure Communication System for Mobile Devices

(text only version)

US Published Patent Application No. 2011/0131406

Abstract

A comprehensive solution for providing secure mobile communication is provided. The system includes techniques for authentication and control of communication end-points; chain of trust to ensure devices are certified as authentic; contact list management; peer-to-peer encrypted voice, email, and texting communication; and a technique for bypassing an IP PBX to ensure high levels of security. The system is able to support use of commodity mobile communication devices (e.g., smart phones, laptops) over public carrier networks.

Inventor(s): Jones; James C.; (Tempe, AZ) ; Cummings; Darren; (Chandler, AZ)

Assignee: CUMMINGS ENGINEERING CONSULTANTS, INC. Chandler AZ

 

Technique For Bypassing an IP PBX

(text only version)

US Published Patent Application No. 2011/0130121

Abstract

A method for establishing communication via a VoIP network bypasses the IP PBX component conventionally used to obtain address information. Instead of obtaining the IP address from a location register of the IP PBX, the method involves use of a server configured to assign and provide to the caller’s communication device a unique address (IP address/port) of a proxy. The caller then sends a Short Message Service (SMS) text message to the callee with the assigned address of the proxy. Thereafter, the caller and the callee connect at the assigned address of the proxy, thereby forming a communication path. Preferably, the devices operated by the parties are conventional smart phones. According to the preferred embodiment of the present invention, the method further comprises the steps of: determining whether to encrypt the communication; and encrypting the communication, if it is determined that the communication is to be encrypted. Preferably, the Station-to-Station (STS) protocol is used to encrypt the data packets.

Inventor(s): Patel; Dipen T.; (Chandler, AZ; Curtis; John; (Gilbert, AZ); Jones; James C.; (Tempe, AZ); Cummings; Darren; (Chandler, AZ)

Assignee: CUMMINGS ENGINEERING CONSULTANTS, INC. Chandler AZ

 

Method and system for a grass roots intelligence program

(text only version)

US Patent No. 7,944,357

Abstract

A system for gathering and assessing intelligence information comprises a credibility filter configured to assign a credibility value to intelligence information sent from a user. A data warehouse is coupled to the credibility filter and the data warehouse is configured to store intelligence information from the user. A predictive query engine is coupled to the data warehouse. The predictive query engine is configured to query the data warehouse to determine potential threat data. The predictive query engine is also configured to store the potential threat data in the data warehouse. An alert poller is also coupled to the data warehouse. The alert poller is configured to receive the potential threat data and compare the potential threat data to one or more comparison factors pre-selected by the user.

Inventor(s): Hodges; Daniel Lloyd (Tucson, AZ)

Assignee: CUMMINGS ENGINEERING CONSULTANTS, INC. Chandler AZ