![]() mobile computing device technology and systems and methods using the same.
专利摘要:
"mobile computing device technology and systems and methods that use the same" means mobile computing device technology and systems and methods that use the same as described in this document. in particular, mobile computing devices that can serve as a processing component of a described disaggregated computing system, non-integral screens that can be paired with mobile computing devices, and systems and methods that use such devices and screens that are described . in some embodiments, the mobile computing device technology includes a mobile computing device that lacks an integral screen, but that is capable of releasing at least video information to a non-integral target screen, for example, through a Paired connection established via a wireless or wired communication interface. 公开号:BR112015019749A2 申请号:R112015019749 申请日:2014-03-13 公开日:2020-01-28 发明作者:Gorios Aaron;Yang Chengda;Adiletta Matthew;f fallon Michael;Wilde Myles;Garrison Thomas;R Wheeler William 申请人:Intel Corp; IPC主号:
专利说明:
MOBILE COMPUTER DEVICE TECHNOLOGY AND SYSTEMS AND METHODS THAT USE THE SAME FIELD OF THE INVENTION [0001] The present disclosure relates to device technology and mobile computing and systems and methods that use the same. More particularly, the present disclosure relates to mobile computing devices that can serve as a processing component of an unbundled computing system, non-integral screens that can be paired with mobile computing devices, and systems and methods with use of such BRIEF DESCRIPTION OF THE DRAWINGS [000'2] Features and advantages of the modalities of. claimed matter will become evident as the following detailed description proceeds, and by reference to the drawings, in which similar numerals depict similar parts., and in which: [00031 Figure 1 illustrates a mobile computing system that includes a mobile computing device and a screen consistent with the present disclosure; [0004] Figure 2 is a block diagram of an exemplary architecture. from a computing device I innovated consistent with the present disclosure; [0005] Figure 3 is a block diagram of one. exemplary architecture of a dumb canvas consistent with the east revelation; iúuüb] Figure 4 is a block diagram of a canvas x.1.1 xçjente exempliricaa consistent with the present disclosure; [tcu / j Figures 5A and 5B illustrate an empathy method initiated by a novel example device consisting of the present disclosure; Lbtuj »] Figures 6A and 6B illustrate an example of a üitjivüij o and screen-initiated pairing consistent with the present disclosure; itousj Figures 7A and 7B illustrate a sxemprij..i method to swim and empire Aament a computing device moved to one of many screens, consistent with. present revelation; lUOlu] Figure 8 is a flowchart of an exemplary frame launcher protocol consistent with the present disclosure; itOiil Figure 9 is a flowchart of an exemplifying frame launcher protocol that includes a compression optimization component consistent with the present disclosure, Figure 11 is a flowchart of an exemplary flow launcher protocol consistent with the present revelation; [viO.i.i .: A riyuiá l.i. depicts an exemplary method of transferring video information from a mobile computing device using one or more tumor channels / modes consistent with the present disclosure; [0a.'t], s rigata 12 depicts an exemplary orientation control method consistent with the present disclosure; [OülbJ Figure 13 illustrates operations that exemplify a gesture module that includes gesture instructions consistent with the present disclosure; [ttlfej Figure 14 depicts an example of cj.u.i..ent operations. oaseaa.as reaction in gestures consistent with the present revelation; l-ci / j figure depicts exemplary operations in response to the execution of enuiaud device instructions within an input device module consistent with the present disclosure; LtOxbj Figures 16A and 16B illustrate a method; which includes exemplifying operations performed in connection with user nuancing with a mobile computing device through an input device coupled to the mobile computing device consistent with the present disclosure; [uUasj Figures 17A and 17B illustrate a method that includes exemplary operations performed in connection with user with user. a mobile computing device via an input device copied to a web, consistent with the present disclosure; 10). Figures 18A and 18B illustrate an example method concurrently paired with a multi-screen mobile computing device, consistent with the present disclosure; [OOzij Figures 19A and 19B depict exemplifying use cases in which a computing device is moved and attached to a screen consistent with the present disclosure i. 0022] A. Figure 20 depicts an exemplary mesh network that includes one or more moving computing devices consistent with the present disclosure; [0023] Figure 21 depicts an exemplary intelligent caching system consistent with the present disclosure; and [0024] Figure 22 depicts an exemplary proxy system consistent with the present disclosure. DETAILED DESCRIPTION [0025] The terms communications network ”and communications networks” are used interchangeably in this document to refer to one or more systems and / or. methods for sending and / or receiving a data signal. These terms cover short-range communication and long-range communication. [0026] The term "short-range communication" is used in this document to refer to systems and methods for wirelessly sending / receiving data signals between devices that are relatively close to each other. Short-range communication includes, for example, communication between devices using a BLUETOOTH® network, a personal area network (PAN), near field communication, radio frequency identification (RFID), ZigBee networks, a INTEL® Wireless Display (WiDi) connection, an INTEL · ® WiGig connection (wireless with gigabit capability), millimeter wave communication, ultra high frequency communication (ÇHF), combinations thereof and the like. Short-range communication can therefore be understood to allow direct communication between devices, without the need for hardware / intervention systems, such as routers, cell towers, internet service providers, and the like. of contrast, the term long-term co-communication is used in this document to refer to. systems and methods for wirelessly sending / receiving data signals between devices that are significantly different from each other. Long-term communication. it includes, for example, communication between devices using WiFi, a long distance network. (WAN) (which includes, but is not limited to, a cell phone network (3G, 4G, etc., and the like), the internet, a global positioning system (GPS), iee or. television, combinations thereof and the like. long-range cumunica- tion, therefore, must be understood in order to allow cumunica- tion between devices through the use of n «.». misses, ·· sxscomas on intervention such as routers, x and .-. l · ce.i. Uxdx es, towers cie blank space v1 sac.,, P !. I died. Internet service combinations are the same. [00281 As used in any mode in this document, the term module can refer to sortware, firmware and / or circuitry that is / are uuiixigmaaovis) for. to perform or tax the performance of one or more operations consistent with piesence rwelaçao, the software may be incorporated as a software package, code, instructions, instruction set and / or data recorded on computer-readable storage media non-transitory. Firmware can be incorporated as code, instructions or set of instructions and / or data that are difficult to encode (for example, non-volatile) in memory devices. Circuitry · as used in Wed. i or embodiment in this document, may comprise, for example, solely or in any combination, wire-connected circuitry, programmable circuitry such as computer processors comprising one or more cores for processing individual instructions, assembly of state machine circuits, software and / or firmware it stores, instructions executed by the programmable circuitry. The modules can be collectively or individually incorporated as a set of circuits that form a part of a client device or an authentication device. [GÜ29 J For the sake of clarity and ease of understanding, the present disclosure often describes mobile computing devices and webs to include one or more modules stored in. a memory, in which the module (s) include computer-readable instructions which, when executed by a processor of the relevant device (mobile computing device or screen), cause the device to perform various operations. It should be understood that such descriptions are exemplary. and that mobile computing devices and screens can be configured to perform operations described in association with. one or more modules from another oaooira. For example, the mobile computing devices and displays described in this document may include logic that is deployed at least in part to the hardware to induce the performance of one or more operations consistent with the present disclosure, such as those described in association with several modules identified in this document. In this regard, it is noted that yogic as used herein may include discrete and / or analog circuitry, including, for example. a general purpose processor, digital signal processor (DSP), chip system (SoC), state machine circuitry, wired circuit elements, application-specific integrated circuits, combinations thereof and the like. [0030] The use of mobile devices such as cell phones, mobile phones, personal computers of the tablet type, and personal computers of the laptop type has increased dramatically. In view of the widespread adoption by the world of these mobile technologies, microprocessor developers are increasingly focusing on developing processors that exhibit both high performance and low power consumption. If the goal of such a development is to increase the processing capacity, while maintaining or even increasing the useful life of the underlying device. In some cases, it has been shown that shrinking the size of processor components can improve processor performance while simultaneously reducing power consumption. In the coming years, it is expected that manufacturing techniques will have allowed the production of avimao casnnnos for new and smaller external factors, The technology to interact with the mobile computing device that lacks a full screen and / or that launches display information to a non-aitsgiax screen and also described. Mobile computing devices can also include communications w.eax.LÇadtís and network technology, which can allow them to continuously connect with each other and with other compatible devices, for example, to establish a connection to an aisxanci.a rode de vinga as the internet or other daoos communications system, various systems and methods that use a mobile computing device consistent with the present disclosure are also described. lüulil As noted earlier, the mobile computing nsposiivs described in this document have. the ability to transmit or * release video information to a screen present in a localized but not integral manner for display. This concert is generally illustrated in Figure 1, in which mobile device 101 is portrayed as transmitting from rn.i.vrmaçues cie viaeo 10t to screen 103. As shown, display 103 is present / nearby in a localized manner (for example, within the same room or environment that) to the oisposxtivo 101, but not the integral with device 101. 101) 34] For the sake of clarity and ease of illustration, the mobile device 101 is depicted in Figure 1 in one. form factor that does not include an ihvegxai display. This illustration is exemplary only, and it should be understood that the mobile device 101 can have any suitable form factor. For example, the morel 101 device can have a form factor that is consistent with any number of mobile wletiunico devices such as cell phones, j.fciuuies exetxónico, ocuios, consoles d.e mobile games, vomputers of the netbook type. noieooox computers, internet devices, personal digital assistants, reproducers and / or media recorders, mobile computers, tablet type personal computers, uitramovable personal computers, usable computing devices, and combinations thereof, No j,.!, mi tdçao., the device 101 is preferably in a Ldior or form that does not include an integral display or that includes a reactive small integral display, of course, the mobile device 101 can be in. another shape tutor, and can be equipped with an integral display of any size desired. However, it should be understood that the term '' mobile computing device 'is exclusive to computing devices that are or are designed to be installed or maintained from another location in a single location for a significant period of time. time (for example, desktop computers, routers, network servers, etc.) as would be aesajaeo by those skilled in the art, [SOib] Also, for the sake of clarity and ease oe illustration, screen 103 was depicted on Figure. 1 in the form of a computer monitor. This illustration is exemplary, and it should be understood that the screen 103 can also be used properly, and can form another independent computing device, such as a system. For example, screen 103 may be in the form of a computing terminal display, a desktop computer display, a laptop computer display, a mobile phone display, a smart phone display, a. ta.oxet personal computer display, a kiosk display, a. automatic teller display, a vehicle display (for example, aircraft, automobile, .oi.cx cleta, motorcycle, train, etc. 1, a medical device (for example, electrocardiogram display), ins display of a recording system (for example, a medical record system>, a display of a. financial transaction system, a mobile game console display, a projector, a. television, an ultra-mobile personal computer display, a usable display (for example, in the form of glasses, a bracelet, a necklace or the like), an inconspicuous badge display, combinations thereof and the like, without limitation, screen 103 is preferably in the form of a display for a desktop or mobile computer. , the display of a computer and table, the display of a device, mobile such as a smart phone, laptop or tablet computer, a kiosk display, a display or public computer terminal, a television or a combination thereof. (00361 In some embodiments, screen 103 may be in the form of a dumb screen. As used herein, the term screen, dumb refers to a display that has the capability to operate as a computer or television monitor that has ability to receive data wirelessly or by wired connection. For example, etcp and displays that include their own general purpose processor. v J 3 mj miujoid a. pxesente frequent cup review i. and fei eixv a. To smart and dumb screens as independent devices, such screens do not need to be independent of other machinery, a set of circuits. mu lares. In tact, smart fabrics and dumb uescricas herein may form all or a parent u and outio mechanical device and / or electric. For example, the smart and dumb screens described in this document can form part of an aircraft, mobile, .oicicieca, motorcycle, snowmobile, medical device, Heads-up display, an interface and control, a port of electronic shopping, a restaurant menu, binoculars, eyeglasses, food preparation utensils, food systems, transaction systems, the smart screens ox / served above, combinations thereof and the like. [0039j Reference is now made to Figure 2, which errata a block of blocks of an exemplary architecture. A. , · ,. I installed it and a moving computing device consistent with the present disclosure. As shown, device 101 includes device platform 201. Without limitation, device platform 211 can be opened. ioxxai «one or more of the aforementioned form factors mentioned above, as suitable for use as device 101. Consequently, device platform 201 may be a cell phone platform, electronic reader pxatarorma, ua.o & platform, piataiçrma . mobile game console, read-only memory, electrically programmable memory, random access memory., flash memory (that is, for example, èadL · or Νυκ type memory structures), memory. magnetic disk, and / or optical disk memory. In addition or alternatively, memory 203 may include other and / or subsequently developed types of user-readable memory. ísemoria zO.j can be integral with the zü.2 processor, separate from the 2 02 processor or a combination thereof. As will be discussed later, memory 203 may store one or more Mioduios that include computer-readable inscriptions, which when executed by processor 202, may cause device 101 to perform functions consistent with the present disclosure. [0043J WCGMMS 204 may include hardware (for example, circuitry), software or a combination of naraware and software that allows the .101 device to send and receive signals on. one or more communications networks. For example, WCOMMS 204 may include one or more antennas, transmitters, receivers, transceivers, transponders, network interface communications circuitry, and combinations of these that allow device 101 to send and receive signals via one or more communications networks, including a long-range communications network, short-range communications network, or a combination of Ck> .the same »Consequently, Vií / OMMS 204 may include hardware and / or software that allows device 101 to communicate with the use of WiFi, field communication how to beat nickel cadmRn batteries based on nickel metal hydride, lithium ion batteries, poxxomer batteries and rcn lithium and lead-acid batteries, celuxes and fuel, sources subsequently supplied with electrical power, wired power of oA or ct, combinations thereof and the like. Without ..L.A.mxuaçao, the power line 2 07 is preferably configured to provide a sufficient supply of electrical power to allow the device 101 and its components to operate in an operating bed.:. «C xon <x i paiticuiar for a desired period of time. [0048] If power source 2 07 is configured as an iOime, I will recharge power just like a battery, a-ecuxiegavei, the same, can be recharged using any suitable mechanism. For example, the 2u / power source can be recharged by dropping the device 101 onto a power source using d © tints, wired connection {eg AC wired power and / ου. CD} . Alternatively or additionally, a. zu7 power supply can be recharged wirelessly, for example with. the use of electromagnetic induction, electrodynamic induction, electrostatic induction, combinations thereof and the like. Alternatively or additionally, the power source 207 can be used with the use of electromagnetic radiation, such as microwave radiation, a laser, combinations thereof and the like. In the latter case, device 101 may iuciuix one. receiver configured to receive electromagnetic radiation from one. source, and convert 'that radiation the same and / or shirt hem, in a pocket of the same 1.): ,,. uencio of the same. · in an Ooiso o and pants or dentxO of the same, combinations of the same and similar. pjuôoj The dumb and intelligent webs disclosed in this document can be configured to display video information received from a mobile computing device consistent with the present disclosure, for example, on one or more media / video signals. Any appropriate intelligent dumb web can be used, provided it has the necessary connectivity to allow the reception of signals containing video information from a mobile computing device consistent with the present disclosure and the ability to interpret those signals and display of the video information contained therein. As will be described in detail later, such signals can be formed for transmission over a wired or wireless connection. thread. Consequently, any burravinteligente display with appropriate physical and / or wireless capabilities can be used. i.0051] Reference is now made to the Figure depicting a block diagram of an exemplary architecture that uses a stupid canvas consistent with. the present revelation. As shown, the stupid screen 300 included hurray .301 screen platform. The platform, with dumb screen. 3 01 can be any screen platform, dumb dumb, and can, for example, correlate to a platform consistent with the exemplary types of dumb screens noted above. For the purposes of illustration, the canvas is dumb. 300 is illustrated in Figure 3 in the form of an independent monitor (e.g., a television) and thus, the dumb screen platform 301 may be an independent monitor piatatoxma, such as a television platform. The dumb screen platform 301 was also illustrated with limited components for clarity and ease of understanding. and it should be understood that the illustrated configuration is exemplary. In fact, the dumb fool platform 301 can include other components that can be commonly seen on such screens. [0052] The dumb screen platform 3 01 includes display 302, media interface 303, and optional wireless communications interface WCOMMS 3 04. Display 3 02 can be any suitable type of display, such as: electronic ink display , light emitting diode display, liquid crystal display, plasma display, phosphor display, organic glow display, organic light emitting diode display, other type of display or a combination thereof. [0053] In general, the media interface 303 can be configured to facilitate the reception of data, audio and / or visual information (display) by the dumb screen 3 00 from a mobile computing device over a wired connection with such computing device. Thus, for example, the media interface 033 may include · a high definition multimedia interface (HDMI), a digital video interface (DVI), a universal serial bus interface (USB) fitting, combinations thereof and similar. Without limitation, the stupid screen platform. 301. includes preferably a combination of the same with the use of an appropriate communications protocol. [0055] As will be described in detail later, the dumb screen 300 can be configured, to receive video monitoring from a video platform. t0Uao] π dumb screen platform 301 can include optional and acácionaiments one or more input devices 305. If included (s), the input device (s) 3 0: 5 can (m) ) be in wired or wireless communication with. dumb screen 300. The input device (s) 30b can be, for example, a touch screen interface, ve., touch screen 3 02, a computer mouse, keyboard, trackball , trackpad or other input device such as a sensor, a button or a switch. As will be described in detail later, the input device (s), 305, if included (s) can ( m) be used to interact with applications running on a mobile computing device and exi.br. in the dumb web 300. In such cases, the dumb screen platform may include integrated circuits of specific application (such as optional ICIC 306 in Figure. 3) or another type of processor that is configured to monitor for inputs (for example , events) made with the input device (s) 305 or by connecting them to a device that is consistent with the present disclosure. ÍUUt / j The dumb screen platform 301 can optionally include memory 307. Memory 3 07 can be inuugial with optional or separate ASIC j06, and can be any suitable type of memory, such as the types of memory previously specified as & dequaqos for use with the mobile computing devices of the present disclosure. If so, memory 307 may include one or more software / firmware modules that, when executed, make the screen stupid for device pairing and / or input monitoring functions consistent with the present xuxuia-yãü. As an example, memory 307 may include a module for matching a pDPM device, not a device, that contains instructions. Computer readable that, when executed, by a specific application processor. of stupid screen 301 induce or facilitate the staging of a stupid cell 3 00 with a u.mobile computing device through a. ca beads communication interface. or wireless, such as 303 or WCOMMS 304 media interface, i.OOoSj fcspecically, memory 307 may include a device sparingly moou.io (DPM not too much; that has computer readable instructions that, when executed by the specific application processor.306 can induce or pair the stupid screen pairing 300 with a mobile computing device consistent with the present disclosure, once the screen murra 300 paired with a mobile computing device, it can receive video and other information on a mobile computing device, for example, by media interface number 03 03 or UCOMMS 3 04. In the first case, video and other information received from a mobile computing device can be included in signals (for example, media / video signals) formed apiopx to, video DVI, HDM.I, and / or USB and, thus, can be readily displayed by the dumb screen 300 with the use of an appropriate 303 media interface. íuOóuj In the latter case, video and other information provided to a mobile computing device can be encapsulated in one or more packages that are ui. dxiwiu i t. The. to the stupid screen .100 through a connection without. thread. In such cases, the dumb display platform 3 01 may include an ASI.C 306 (or other type of processor) and a video decoding module (not shown) stored in memory 307. The video decoding module may include computer-readable decoding module instructions (for example, JAVA or other code) that, when executed by ASiC 306 or another processor, cause the dumb screen 300 to decode packets received from a mobile computing device to obtain the video information contained therein. The decoding module instructions, when also executed, can cause the dumb web 300 to display the video information obtained in this way. IvübOj Memory 3 07 can also store one or more input device monitoring modules (IDMM '·'; not shown). If included, an IDMM can include computer-readable instructions that, when executed by one. processor (eg, ASIC 306 or other processor) induces the performance of input device monitoring and reporting operations, consistent with the present disclosure. For example, IDMM instructions, when executed, can cause the screen 300 (for example, ASIC 300) to monitor for events associated with. optional input device (s) 305, such as mouse click operations, mouse click and release operations, a. touch input (if touch (s) 305 include (in) a touch screen, finger slide operations, movement operations, combinations thereof and the like. Upon detection of such an event, the IDMM, when executed, pooe cause the processor to report each event as input information to a mobile computing device, for example, through a media interface 303 (in the case of a headless communications link between the dumb screen 300 and a mobile computing device ), a Docking Interface (not shown), a wireless support channel (not shown) between the dumb screen 300 and a mobile computing device or a combination thereof. [0061J Reports of input information produced by the dumb screen 300 may include any suitable type of information. For example, such reports may include pixel coordinates that specify the location and / or type of an event, such as the location of a mouse pointer during a mouse click, a mouse click and release, the location of a mouse in one. screen. software / r Irmwa.re (also not shown) for the 406 processor. For example, the eu / po memory can store one or more software modules that, when executed, by the 406 processor, are used with. that the cOO smart screen performs staging operations consistent with the present disclosure. nSpecitiearn this, memory 407 may include a device pairing module (not shown) that includes computer-readable instructions which, when executed by the general purpose processor 406, can be 1 max. or psieai the intelligent screen pairing 400 with a mobile computing device via Uxucs. iuleiidce of wired or wireless communication, also as media interface 403 and / or WCOMMS 404. The execution of the Dm can occur within the context of the opexational system executed by the processor 406 'or in another context. [0066] loves the time when the smart screen 400 paired with a mobile computing device., A. it can receive video and other information from the mobile computing device, for example, through the mioxa 403 or WCQMMS 404 interface. The video and other information can be included in a properly formed signal (for example, in the case of wired transmission) or enuapsupled in packages (in the case of wireless transmission), any of which may be Jecouxlxcaaa and / or interpreted upon receipt by one or such intelligent screen components 400 such as p.i. ocessadui 40à or WCQMMS 404. For example, memory 407 can store a video decoding module (as shown), the video decoding module can include readable decoding instructions by uvmput.daox ! , .ρ · οχ exempio, JAVA or other cociico) cue, when executed by the '406 processor or another processor, cause a. intelligent screen 400 devudi i .xWhich pscoues received the mobile computing device yin to get the video and / or other information contained therein. Decoding instructions, when also executed, can cause the smart screen 400 to display the video information obtained in this way. [0067] A. memory 407 can also store one or more input device monitoring modules (IDEM; not shown). If included, the IDMM code includes computer-readable instructions that, when executed by an example specific application processor (406 processor) or other processor, cause the performance of input device reporting and reporting to be consistent with this disclosure. . For example, IDMM, when executed, can cause the smart screen 400 (for example, processor 406) to monitor for events associated with optional input device (s) 405, and relate such events as input information to a mobile computing device. The nature and function of these components are broadly the same as that of the corresponding components of the dumb 300 screen and, for the sake of brevity, are not repeated. [0068] The stupid screen platform 401 can also include power of 408that could be any suitable source of electrical power. for 400 smart screen and its components. Examples [00'7 4] As shown in the Figure. 5.B, a pairing method initiated by a mobile computing device may begin at block 501. in which a pairing application is started on a mobile computing device. In this regard, the mobile computing device may include memory that has a pairing module stored in it, in which the pairing and lham.en.to module includes instructions that, when executed by a processor of the mobile computing device, make with which the computing device moved, perform the pairing operations consistent with the present disclosure, the execution of the pairing module instructions may occur in response to one. user input such as a push of a button, voice command or the like, Alternative, or delayed, the execution of the pairing module instructions can take place in response to the detection by the mobile device of one. particular gesture or movement made with the mobile device (that is, in response to a recognized pause of gyroscope and / or accelerometer data). 100 / 5i Once the pairing module is started, the mobile computing device may need to identify the screen with a. which it goes to pair (hereinafter, the target screen). More specifically, the mobile computing device may need to know an identifier of the target screen, such as its internet protocol address (XP) as generally shown in the method in Figure 5. If the mobile computing device already knows the identifier of the screen, the method can skip optional blocks 502 and 503 and proceed to block 504. If the broadcast your IP address with. the use of BLUETOOTH or NFC in response to receiving a request for a mobile computing device. pJv / cj In other words, the mobile computing device can include, on its own, a D.PM that includes xegiveía instructions per computer that, when executed, cause the mobile computing device to broadcast a request to a screen IP address through Λ ν, BuuarOuxH. or. another short-term communications network. Similarly, a target screen may include a Dh-M that has instructed instructions that, when executed, will monitor the monitor for screen identifier / IP address requests. When the target screen <· _.λ,. <Ο ui: .a büiiLuLdçdü for a screen identifier / IP address (for example, when a mobile computing device enters the range of communications with the screen}, the DPM of the screen can cause the web to transcode its identifier / IP address to the uispubiixvo ue computation moved using a «.piopi itic form of communication. For example, when a target screen receives an IP request from a device mobile computing via an MFC or BLUETOOTH connection, the DP.M instructions on the target screen, when executed, can cause the target screen to transmit its IP address to the mobile computing device via the NEC or BLUETOOTH connection, as appropriate. itO ry_] The mobile computing devices described in this document may also attempt to obtain one. the identifier / ip address of a target screen from a third party system, such as a server that has exhibited »at supper. The display of the pairing key mobile.. example title computing, mobile devices. The webs described in this document can be paired (this means having a paired connection) so that the video and other information are transmitted from the device. computing moved to the screen with the use of a first socket, such as a remote monitor socket. This can allow for unidirectional video communication or hospitalizations from. a computing device moved to a cell. In additional modalities, the tio pocos, that of the sacking change, can also establish one. Channel. support to allow the communication of information from a smart / dumb screen to the mobile computing device. The support channel can be tatej.a -.-, cido com. the use of the same socket used for transmitting video and other information from a computing device moved to a paired screen or other socket. In some modalities, u.Mobile computing devices and screens described in this document can be paired to. in order to establish a support channel (and optionally a forward channel) using the Real Time Continuous Transmission Protocol (RTSP) socket. [0083] In this regard, the mobile computing devices and screens described in this document may include one or more support channel modules that may include computer-readable support channel instructions that, when executed, result in the establishment of a channel of support between a mobile computing device and one. screen consistent with «. present disclosure, The execution of the support channel instructions by the respective processors of the mobile computing device and screens can make with ytfe v..cs.j .. & cisposí tzvos negotiate. a punch to each other on the side of the use with a supportive communications channel. As noted earlier, the mobile and silly devices or computing described in this document can be configured to support the use of the RTSP socket or other socket as a support communications channel. lOOtlj the metooo can then proceed to block 508, where the splicing session can be maintained, and the mobile computing device can monitor whether a termination event has occurred. More specifically, the xubution pairing module to and from the device in the mobile computing device, when executed, can make the mobile computing device monitor whether there is an event that will end the emparei.nam.enco session. and / or communication channel (s) between the mobile computing device and a paired screen. Non-limiting examples of such termination events include failure signal, timeout / session expiration, receipt of a termination request from an apl.kcatxvo on. execution on the computing device moves. ·, or screen, combinations thereof and the like. In block 509, a determination can be made to determine whether an event; termination has been detected. If no termination event has been attended; detected, the method can proceed back to block 508, where the 2/274 paired before, the exchange of a connection key and / or the verification of the optional user may be omitted, and the device and theta may pair upon receipt by the screen of a public connection request from the mobile computing device. If multiple known screens are present within the range of the moving electronic device, the connection to one of the devices can be disassembled from a connection to the other device as specified above. Alternatively or additionally, the mobile computing device can be configured to, assume a connection to one of several known screens, and toggle or change the connection to another known screen at. response to an entry as such. button press, gesture, combinations thereof and the like. [0090] By way of example, the technology described in this document can be manufactured as one. kit · quo includes at least one mobile computing device and at least one non-integral screen. In all cases, the mobile computing device (s) $ screen (s) in the kit may come paired at the factory. That is, the pairing information for the screen (s) in the kit may come preloaded on the mobile computing device (s) in the kit, and vice versa. In such a case, the pairing operations and / or user verification discussed above can be omitted, and the devices and screens on the kxt can pair with each other using the pre-loaded pairing information. It is checked. now reference to Figures 6A and 6B, which illustrate a non-limiting example of a roll-initiated pairing method consistent with the present disclosure As shown in Figure II, screen 103 can initiate pairing with mobile computing device 101. pairing of device 101 and scroll 103 can occur with use example method shown in Figure 63. the compatible morel device is present (as determined by the monitoring tunings carried out with respect to block 602 or if the presence of a compatible mobile computing device is already known} the method can proceed to block 604 where the screen is jammed with the mobile device, this one, xtsbpextu, the web can initiate a communications channel connection with the mobile computing device compatible with the use of available short-range communications networks. For example, the screen can transmit a on the request of the company (for example, including the screen's IP address, toUported video modes, supported video compression standards, video package formats, etc.) to the mobile computing device via BLUETOOTH® , NFC, a ^ jpaee network, a diFi area. Combinations of them and the like In response to receiving the pairing request, a computing device compatible mobile can negotiate a first level connection to the screen. LüUããJ Once a cane.l connection from> -. Omuxiik .. »tortions initiated enters the screen and the moving device, the method can proceed to the block in which one. root of trust can be established wS-uxc the web and the mobile computing device. The root tó couix & nçd can be established in any suitable way. For example, a splint and the mobile computing device can establish a root of trust, one. vuLíu âvfeibl (induces its. laentidada, environment of execution, even, u.m of the other with the use of any If a termination is detected, however, the method can proceed from block 611 to block 612, which, the session is terminated and the method ends, and, the webs inside the. communication range of. first web) accept pairing requests from any mobile computing device. Referring to. iVLOura / A., the / 0 3: - screen can be placed in a ^ iipassnadia ^ Hcg ço.uloxino CQ.scutx.do anima mode, and transmit a uluqueq binai to the screens 103 ·., 103 n via a Aimer race ue communication ca.bea.da or without fits, In response to the blocking signal, splints 103.;, 103 .., can go off in a lock mode and ignore any pairing requests., For example, for a specified period of time or until the reception of a fc.iucii o and iioeration on the lU3s screen. Similarly, the webs ± u3i, iu3 n may not. attempting to start the stalemate with no computing device I moved while in lock mode. i 4. '· .- rj drsict ve, · :, that a signal that the lock has been sent, the hretodij pvQe proceed to Oioco 04, in which the first u «la can monitor if there is a reception signal «Mapping from a single mobile computing device. In this regard, the signs of emp <Ai w .; na.uteii to be transmitted by a mobile computing device consistent with the present disclosure ί..ί .. ·· ΐΛ the jbu of any suitable wired or wireless communications network, as discussed above. In some cases, the mobile computing device can be configured to transmit the pairing signal in response to an input, such as a button press, gesture or combination thereof. In any case, the method can proceed to block 705, where an determination can be made by the first screen to. determine whether in single signal to match el.ham.entc was received. If a single empa.relhaman.to signal was not received or if multiple pairing signals are received at the same time, the method can proceed to block 706 where the first screen can determine whether a pex.j.or or oe time for connection exhausted, If so, the method proceeds to block 711 and closes, in such a case, a. first screen can be configured to start the hoist. connection with an audio and / or visual indicator, such as the illumination of a light, a series of auditory cues (for example, beeps), combinations thereof and the like. If the time period for connection has not expired, the method can proceed back to block 704, in which the first screen can continue to monitor for the reception of one. pairing signal from a single mobile device. i00102j once it a. first screen receives an emp «j signal. With a single mobile computing device, the method can proceed from block 705 to block 707, where the first screen and mobile computing device can be paired according to. the fetus. Use in blocks 604 to 608 of Figure 6B, and a pairing session and communications channel can be scanned in the same way as described in block 609 of Figure 6B. The method can then proceed to block 709, where the first screen and / or the device dt; uuSipuuaçdO move. ·. can : maintain the session and monitor if there is a termination event. In the block, a determination can be made through the first screen and / or the mobile computing device to determine information to a screen through one. physical connection (θ '--- · - or a wireless connection such as WiFi, BLcxfijoTld, uncle with gigabit capability (WiGigj, millimeter wave technology, ultra-high frequency communication, combinations of the same and similar. For some modalities, the device pairing instructions, when executed, also make leisure with the device establish a support channel for the transfer of information from a screen to a mobile computing device The establishment of such channels is described above and for the sake of brevity is not reiterated iGc.A.lud Os mobile computing devices and screens described in this document can be respectively configured to transmit and receive video information in a number of ways, for example, the mobile computing devices and screens described in this document can be configured so that they are compatible with video transmission technology such as the INTEL® wireless display (WiDiJ and / or WiGig technology, wireless USB or other existing wireless vice technology. The cG operation and hardware requirements of these existing technologies are desired, and therefore are not described in detail in this document. [uviGj] Fmboxa existing wireless video technologies can be useful, they can have one or more disadvantages. For example, the atovyis computing devices and webs described in this document can be uu ; i.i. iguiacos in a way that video information can be transmitted from the mobile computing device to the screen using the technology of the Wireless Display ..neex- ( A wm) x *; . Although this technology is useful, some WiDi deployments may be based on the use of for example, for the purpose of reducing latency. Specifically, the current WiDÍ deployment can fcjzl.gix the use of a particular network interface and oe vioeo hardware on the screen (receiver) side, so that video information received by the screen can be returned directly from the screen's network interface and placed directly in the temporary video storage of the video circuitry of. screen. Thus, although mobile computing devices and screens can be configured to support Wi.Di. the hardware limitations of this technology can be quite limiting, particularly if a user wants to pair one. mobile computing device a UTflct t., k 3.L <i ΧΊ0.Ο Ι'.ΘΠί Q TIGQGG 1'i <'.) [v γ ' u.1 aiisini l loos da. screen back to uw moving coxtpuiaçao device. For these and other reasons, other options for transmitting display (video) information from a mobile computing device to a web may be desirable. LOQiO / j To address one or more of the challenges with existing wireless display technologies (particularly dxpí), the inventors developed two new wireless display protocols to transmit display information from a mobile computing device to a smart / dumb paired screen . These protocols are referred to in this document as frame launcher and flow launcher. As will be discussed in detail below, both of these protocols use point-to-point communication to transmit video and other information from a mobile computing device directly to a supper. If so, they differ significantly from technologies such as virtual network computing (VNC) and virtual display computing (Via.) That transmit a display from a host (server) to a customer over an intervention IP network such as the internet, a corporate network or SiMaiais®, at the same time, device to the touch and that the launcher and flow launcher protocols use point-to-point communication, they may not suffer from latency problems that can be experienced in systems that use VNC and / or VDC technologies. Finally, frame protectors and flow launchers can be run from any screen that has adequate processing and coverage, thereby decreasing, minimizing or eliminating the limitations that may be caused by specific hardware requirements. other wireless video technologies, 10Θ108] IM aspect of the present disclosure, therefore, move away from a mobile computing device that is configured to transmit video information to a smart / dumb screen using a frame launcher protocol. Such devices generally include any or all elements of the conxorm device described above in relation to Figure 2. In particular, such devices generally include logic deployed at least in part in hardware, such as a pxocessor, memory, oxCOMMSp wireless communication interface, media interface, one or more sensors, a source and power, and, optionally, one or more input devices. The processor can run an operating system, which can be stored in the processor. memory to the mobile computing device, the memory can also store a frame launcher module, which may include computer-readable instructions that, when executed by the processor, can cause the mobile computing uj.oyvhitivu to transmit video and / or others daoos to a smart / dumb paired screen through of a media interface (wired) or an interfaceprotocol without communications. frame launcher wire. how to use in one [00109] 1 x made now reference The figure 8, what xeurata a flow chart of a launcher protocol in four exemplifleader consistent with the present disclosure. For discussion purposes, the protocol in Figure nfeluào you can proceed to the optional block 803, in other words, the temporary storage of the captured frame can be extended. As will be discussed later in connection with Figure 9, the degree to which the frame buffer is compressed can vary based on a number of factors, such as processor load, compression time, and available bandwidth on. paired connection between the mobile computing device and a smart / dumb paired screen. OOJizi In some modalities, the temporary frame storage can be compressed with the use of compression between frames, infra frame compression, color space compression, data reduction or. a combination of them. Without limitation, the temporary frame storage is preferably compressed with the use of infra frame compression, that is, in which the strokes for each individual frame are compressed. In any case, compression can be performed by scxt-ware or one. hardware compression engine included in the mobile computing device. tÕuiiq] after the compression of the captured frame temporary storage or if the captured frame temporary storage is not compressed, the method can proceed to block 804, in which the captured frame temporary storage can be encapsulated in packages. In this regard, the frame launcher instructions, when executed, may cause the transmission of the captured frame's temporary storage (for example, through a software or hardware pipeline) to a communication interface without closes. lOOli '/ j As noted above, the frame ladder protocol can optionally extend frames to the temporary storage of the captured frame prior to its encapsulation in packages and transmission to an intoxicating / stupid empire screen. Although compression is used in situations where width limited bandwidth is a.Lopui;.: .vel for transmitting video information to a smart / dumb paired screen, it can increase the processing load on the processor of a mobile computing device. In some cases, the load imposed on the processor by compression of the frame temporary storage may be sufficient to affect the performance of the transmitted display, in a sound manner. In fact, if the processor is unable to compress frames from the fast capture frame buffer the isuxivxfehue, the transmission of one or more frames from the captured frame buffer may be pulled. Alternative or additionally. The. px display added to the screen can run at a lower than desired number of frames per second. So oi.ruia.cLr, the na.nda oaiguia on the six-wire connection between the mobile computing device and the screen can be limited, which can impact the performance of the launched display regardless of the capabilities of the respective capabilities of the screen and mobile computing device. Any of these problems can result in an undesirable user experience or / or exxnxr performance that is inappropriate for a particular task. lGcx-Rj As an option to address the preceding problems, mobile computing devices from piesenue revelation can be configured to adjust ainamxcainence the level and / or type of compression applied to frames in an α nm tapped frame temporary storage to achieve a metric of performance you want to use such as processor performance (eg load), display performance (eg frames per second), bandwidth maintenance, power consumption, combinations thereof and the like. In that regard, one. aunazenaoo frame launcher module: with a memory of a computing device moves /. may include a compression optimization component that includes computer-readable compression optimization instructions that, when executed, make the mobile computing device monitor one or more performance metrics or dynamically adjust the quantity and / or compression applied to a storage captured frame in order to achieve one. desired performance level. [00.xx.yj And now you have reference to Figure .9, which shows a flowchart of an exemplary player launcher protocol that includes a component of compression and compression to dynamically adjust the compression applied to frames of a temporary storage of captured fish. As shown, the method starts at the SOI block. In block 902, moan, · .ο frame launcher instructions, when executed by a processor of a mobile computing device, code taser with which the device captures the device's temporary storage at the kernel level, as described above in connection with block 802 of Figure 8. [surdOj In block 903, the launcher's instructions for the board, when executed, can cause the CL · tops. ·. mobile computing has compressed frames from the captured frame buffer using a specified compression type and at a specified compression level. At. initial run, frames in the captured frame buffer may be uncompressed or compressed to a •.-Initial company (first) with a first type of compression. Compression of the frames can be performed in the same or similar manner as described above for block 803 of Figure 8. In some ifivUaiiadüeiá, · the initial type and level of compression applied to each frame can be determined during the pairing. a mobile computing device with a smart / dumb screen while performing emp areih amen to discussed important in cases where compatible, for example. one of the protocols of This can be a screen in t e1i g ent e / bur r a has the ability to decompress data that has been compressed with only certain types of compression algorithms. [vU2x] the methane can then proceed through the 9ua and ãOb blocks, in which compressed frames from the captured frame temporary storage are t-: i-aptou ..! packaged and transferred to a wmpare.j.naua screen for display. The operations carried out according to these blocks are substantially the same as those described above, in connection with blocks 804 and (..Jo dd xiyura be, adão, will not be reiterated. Due to the tact that the type of compression and howl of vumpiessáo apucaaos., each frame of the ueiupoiáno storage and what captured can differ in this method, however, the instructions of compression optimizations, when executed, can make the mobile computing device make notes of each package produced according to the block 904 with information related to the type and / or level of compression applied to the frame en.capsu.lado in such a package, this information can be used by a taipox screen Cxxiada pai a. that it receives from a mobile computing device. 1. üfizij In br hollow 90b, one or more performance metrics can be monitored versus the type and level of compression applied to frames in temporary storage or captured frame, ie Compression Optimization instructions (integral or separate from launcher instructions) of frames) when executed by a processor of the mobile computing device, it may .thax ctxn that the device monitor one or more performance metrics versus the type and / or level of compression applied according to block 903, Lv’Ulza] The type and nature of the performance metrics that can be monitored can vary widely, and may include metrics that are intrinsic and / or extinct to the mobile computing device. Examples i.icio lim.j. (..scores of appropriate performance metrics native to the mobile computing device include processor charge, processor cycles / time required to complete frame compression, usage if power, battery level, combinations thereof and & xiimax «.s. non-limiting examples of appropriate performance metrics extrinsic to the mobile computing device include display frame rate, loao and oe signal and bandwidth of the communications channel between the mobile computing device and a paired supper, combinations of the same similar u. in the ÜWC.O 90 a decision can be made to determine whether the monitored performance metrics are 'feasible in view of one or more pi.eaef xrudos performance thresholds. In this regard, the instructions for compression and compression, when executed, make the mobile computing device compare one or more of the performance metrics monitored against one or more thresholds of performance duiiespondenf.es. Performance thresholds can be used by a user of a mobile computing device (for example, based on user preference) or they can be predefined by a manufacturer or provider o ..: services to define the characteristics of acceptable performance ( for example, quality of service), itóllSj If the monitored performance metrics do not meet or exceed relevant performance thresholds, the method can proceed to block 9Q8, or even a level of compression applied to. frames in the captured frame buffer can be adjusted, the type of compression can vary from one type to another, and the level of compression applied with one type of compression can be adjusted upwards (increased compression) or downwards to address different deviations. performance and or to achieve a desired balance of performance. [GvAAèj Poi example, a mobile computing device can be configured to perform pioatxvo air management. In such modalities, the vomputdção movi poor device will be configured to monitor the available xaiguta de oancia in a connection established with a paired web, thus with the load of piocessacor / expanded CPU cycles to compress frames with the use of a compression technique particular level and / or level. Information obtained through such monitoring can be used to adjust various parameters such as type of compilation, video response, video content, etc. i.im to achieve a desired level of display performance. [001 //] By way of example, a mobile computing device consistent with. the present disclosure c.qu.ipd.çç · with a processor relatively lawiuo, but poo.e have established a high width of: bandwidth connection with a paired screen. In this case, the type and level of compression initially applied to. captured frame temporary storage frames bandwidth, required to transmit enough packets P ^ of n®q to be available on the communications channel, Fara. When addressing this issue, the instructions for optimizing sessions, when executed, can cause QibpüsiLivo o and mobile computing to switch to a more processor-intensive type of cuffs that is capable of increasing frame compression, and / or increasing the level of compression applied to frames of the «temporary ijuazenainyimo of captured frame. Either or both of these settings can reduce the size and / or number of packet data transferred over the communications channel, potentially within an acceptable bandwidth threshold. In some embodiments, such adjustments may come in the cost of elevated processor load, which means that increasing the level of compression and / or adjusting to a more intensive type of compression may be exultant. in need of aaiciona.is processed cycles to perform the compression, relative to cases in which a lower level of compression and / or less intensive type of compression is used. lüOUOj Once an adjustment for the type and / or level of compression is performed in accordance with block 90'8, Hiutüàij p> ,. j <ae pa.Otoseguir cie vcd.ua to block 90.3, where the i .... s.pu e / uü. u.e compression adjusted and applied to additional frames from the captured frame temporary storage. The method can then repeat through blocks 903 to 907 until a satisfactory level of performance is achieved once a satisfactory level of performance is achieved; the method can proceed to block 909, in the <e α-e tluxo launcher, when executed, can cause the mobile computing device to compress the video. λ- e & toe lespeito, the mobile computing device can lnuxu.il a nardware engine and / or compression software (not shown) configured to compress the aeroo piouuí4.do video with the 1003. Without limitation-, the mobile computing devices of the present disclosure preferably include a hardware compression engine for this purpose. Non-limiting examples of suitable compression engines that can be used - .. include I-i.zcu, green and blue worm (RGB) for U''W42 0, other compression engines, combinations thereof and the like. [00Í38] Since the video has been compressed or if the video is not compressed, the method can proceed to the ivun block, in which the flow launcher instructions, when executed, can cause the curator device to transmit the video to a paired screen through an established communications channel. That is, the flow launcher instructions, when executed, can cause the video produced according to blocks 10 02 and, optionally, 1003 to be transmitted to a paired mteiigente / dumb screen through one. established wired connection. or faithful sound. video transmission can be done using any suitable video transmission protocol, such as a continuous video transmission protocol. Non-limiting examples of suitable video streaming protocols that can be used include RTSP, other with such information to be rendered / displayed in uxTs vísoi. In this regard, the screens described in this document may include a video decoding module stored in its memory. The video decoding module may include computer-readable audio-instructions (for example, uwA or other code) that, when executed by a processor or integrated circuit of specific application of the screen, make the. screen decode signals containing video and other information received from paiuxi o.e a mobile computing device. In some embodiments, the decryption instructions are configured to allow the screen to interpret and / or decode packages that contain video information, simply decompress that video information, and / or facer coin That such video and information are displayed on a web . Consequently, the decoding instructions can be configured to support the package format, video format, and type / amount of compression used by a paired mobile computing device, [00141] the performance of the display played on a screen. can have an impact due to a number of factors, including mobile computing device performance, available send width on the communications link between the Qxsposruivo o'e compute and the screen, the processing capabilities of the web (if any), and combinations of the same. For example, a wireless communications link requires a mobile computing device and a screen may have limited bandwidth. In such cases, the link video inputs from a mobile computing device using one or more channels / modes of vatiuiüCâçoes. For the purposes of this discussion, the mobile computing device is presumed to be paired without. attached to a compatible screen and that a single communications channel was established before the method was executed, as described above, In oloco 1102, a mobile computing device can transmit video and / or other information through one. connection / channel established to a paired screen. That is, the mobile computing device can launch its exunition to a paired screen through an established wireless communications and channel. The method may then proceed to tioco 1103, in which the moving computing device and / or screen can monitor the performance of the launched display and compare it to the pre-established display design requirements. The monitoring of the performance of the launched display can be performed in any appropriate manner, for example, the mobile computing device can monitor display performance reports (for example, frames per second) that are received from a paired screen via a channel. of established support, alternatively or additionally, the j spos j..t ivo o and mobile computing can monitor the rate is / or speed with which, the video data is Lr <anxmiuiaos of its uncertain.ce of wireless communication to a paired supper, and compare it. for pre-established rate / speed requirements. Other metrics can such as a Microsoft WINDOWS® operating system, the Google android ® operating system ·, the nppie fc operating systems : iOS and / or OS X®, a Linux operating system, another operating system or an inaction with them. Such operating systems, when run, produce a free user interface (GUI) that facilitates user interaction with the operating system and applications run from within the operating system. In. a traditional device, the GDI can be displayed on a teak which is integrated with the device or which is cohfcCtdua of the opponent with a wired connection. 00153J As a traditional device, the mobile computing devices of the present disclosure can also run operating systems such as those mentioned above. Unlike thiaditional devices, however, nsóve.i computing devices. » The errors in this document may lack an integral display and can be configured to transmit or Λ launch the issued display produced for the execution of an operating system or application (for example, a GUI) to a non-integrated device, as discussed above. The result can be a disaggregated computing system in which the processing and execution of an operating system and applications occurs on the mobile computing device, but the video freckle resulting from such processing and execution is transmitted to a non-integral screen for example. io, using a wireless connection enure the mobile computing device and the screen. G t j- 5-ij Mu.l us webs (for example, laptop-type computer displays, televisions, xeugente ueifexvne displays, etc.) are configured to display images and video in a certain orientation (landscape / portrait) and with a certain aspect ratio (16: 9; .16: 10; 4: 3; etc.). As a result, the management of the orientation and / or reason of the transmission is transmitted from a device or device can be desired, particularly if the moving computing device is capable of producing a video output that is in an orientation o .. · .iwieute or in a different aspect ratio than the interface and aspect ratio of a screen with which it is paired. [001 ~ q] It is noted that many applications intended for, running on mobile device operating systems (for example, ANDROID '55 , Apple QS®, etc.) are encoded so that the video output of the application po &c> a giiai or switch in response to one. change in. orientation of the underlying device. For example, if a mobile device rotates from a portrait orientation to a landscape orientation, applications are executed within the context of a mobile operating system exeeuuddotí on such a device pcs.ru can be configured to change its demand for video output accordingly. This change in orientation can be predicted by receiving change update messages. screen messages received from the operating system. Of course, an application does not have to be coded in this way. In fact, some applications can be encoded so that their video output remains in a fixed orientation, whether the device is running that application rotated or not. tübitbj with the proceeding in mind, the mobile computing devices described in this document can pair with several different screens that have varying preferred orientations, ratios of scale and / or aspect. As a result, the video output transmitted from the mobile computing device can be unified and / or scaled in such a way that it is inconsistent with the orientation and aspect ratio and a paired screen. For example, the display emitted from a mobile computing device may have a first orientation (for example, landscape ;, while a screen paired with. The mobile computing device may have a second orientation (for example, portrait) that is different from This difference in node fasex orientation with which the video output of the moving computing device is displayed in a recognized way inappropriate on the screen. iuui5 / j Reorienting the mobile computing device can also cause a. orientation of the video output to the switch and therefore make the video orientation displayed on a paired screen switch. This can be problematic, particularly if the mobile computing device is not kept stationary. For example, if the mobile computing device is stored in a user's pocket, its orientation (for example, as reported by one or more gyroscopes within the mobile computing device) can be computed repeatedly as the user device, to move. With the orientation of each reorientation of the display emitted from the device, it can change. This change in orientation can &> e.f. trouzioa the paired web. That is, the same can .Laser with. that the video orientation displayed on a paired screen changes repeatedly, potentially resulting in a disturbing user experience. LÜOitu] Some applications running within an operating system may require video output that is oriented in a particular way, regardless of the orientation of the device on which the application is run. For example, some applications can be coded to require video output with a landscape orientation, regardless of whether the device running the application is portrait or landscape oriented. As a result, video information transmitted to a paired device screen. mobile computing applications may have the Orientation required, even if that orientation is not consistent with a pre-set orientation of the paired screen, [OOioá] Finally, some applications can be programmed in an intrinsic way with a display orientation in mind, but they can be coded as if they were in the opposite orientation. In such cases, the input information device (for example, mouse and / or touch coordinates) sent from a paired screen to a mobile device (for example, through a support channel as described below) can be opposite the coded orientation. For example, an app can be designed with landscape orientation in mind, but it can be coded as if it were executed in portrait orientation. In such cases, the video knowledge transmitted from an eompu device. move the urn, cell can be displayed on the screen in one. landscape orientation. This may cause a web to report incoming inputs (for example, from input devices attached to them) to a mobile computing device in a way that is inconsistent with the application's projected orientation. 11'0150] For example, an application run by a mobile computing device can be designed with one. landscape orientation in mind, but it can be cod.ii.-Lca.do as if you were to be executed in a portrait orientation. In such cases, the video output of the mobile computing device can be launched to a paired screen and displayed on. landscape orientation. As will be described later, the input devices attached to the screen can be used to interact with the application running on the mobile computing device. This interaction can be facilitated by the event report (for example, mouse clicks, swipes and finger, touches , etc.) across the screen to the mobile computing device, for example, via, and a support channel. In this case, due to the fact that the screen is unaware of the coded orientation of the application, it may report pixel / location coordinates corresponding to an event generated by an input device (for example, A click, swipe, mobile computing device. disable guidance screen change notifications that can be sent from an operating system to an application that runs within the context of the operating system. That is, guidance instructions, when executed, can cause the operating system to report to an application that the mobile computing device is in a rough orientation, even when the physical orientation of the mobile computing device may change, allowing for screen change production guidance notifications., applications running in the context of the operating system may require a video output with an orientation that is consistent with. fixed orientation reported by the operating system. As a result, the video released at. a screen paired to the mobile computing device can remain on. a fixed orientation. [00164] Alternatively or additionally, the guidance instructions, when executed, may allow automatic control over the. orientation of the image produced on a matched screen informing the screen how to orient itself and / or, otherwise, configure the display to remain consistent with the demands of an application running on the mobile computing device. In this regard, reference is now made to Figure 12, which depicts an exemplary orientation control method consistent with the present disclosure. For the purposes of discussing this method, it is assumed that a mobile computing device was previously paired with. a compatible screen, that the mobile computing device launches its exposition to a screen, and that the display correlates to. one". gra.f i.ca user interface of an application running on the mobile computing device eu within the context of an operating system. LÜ0161] According to the master's degree, the method of Figure 12 begins in block 1201. In block 1202, guidance instructions executed by a processor can make the device or mobile computing monitor the expectations of an application running on it in relation to guidance and / or other parameters (resolution, scale, etc.) of your display output. One can vexinate, the application expectations in relation to ex.ioir a. orientation and / or other parameters may change in response to change orientation, screen notifications received from an operating system. [001661 The method can then proceed to block 1203, at. that a determination is made to determine whether a change in application expectations in relation to the à..ithuaÇd-o and / or other x / arameters of your exiotion output has been detected. If no changes were detected, the method can go back to block 1202, in which the user's instructions and guidance, when executed, additionally cause the mobile computing device to monitor if there is one. changing application expectations. If a change in expectations is deltuCuáda, however, the method can proceed to the izvo block, in which the guidance instructions, when executed, can cause the moving computing device to transmit the change in expectations a. an. paired screen, the change in expectations can be linked to any appropriate message tomato. For example, the change in expectations can be transmitted in a message format, or it has a uaPecillho that defines the change in expectation in question (for example, change of orientation, scale, resolution, etc. ' ) f ® a piece of data / body either identifies the newly expected values. iUO.167] With that in mind, a paired screen can include an orientation control module that has computer-readable guidance instructions on it, which, when executed by a processor, cause the web to adjust the parameters of the. display launched to remain consistent with the expectations of an application running on the mobile computing device. oi example, in response to receiving a signal that leads to a change in the display expectations of a mobile computing device, guidance instructions, when executed by a screen processor, can cause the screen to change axi.ui features tion launched so that they are consistent with the new expectations set in sxrici.i. end. some modalities, the instructions of uixsntaçao, when executed, can cause the screen to end an existing window in which the display launched, and render / displayed, and open, a new, window that yields! with modified expectations. Orientation instructions, when executed, can then optionally make the screen. notify the mobile computing device by message and recognize the change in expectations and / or the production of the new window. (0.0168] Turning to Figure 12, once the mobile computing device transmitted a signal containing change and expectation information to a paired screen, the method can proceed to the optional zzO, ··, in. A mobile computing device can monitor whether a screen recognition is being received, whether monitoring is being carried out or not, the method can proceed to block 1208, in which a determination is made to determine whether the mobile computing device will continue to monitor whether there are changes in application expectations in relation to the orientation screen and other factors that can impact the appearance of the launched display. If the monitoring has to continue, the method can go back to block 1202 and reset, if not, the method can proceed to block 1209 and close. [00169] Another aspect of the present disclosure relates to teunoiogxa to selectively download the determination of a certain content from a mobile computing device to a non-integral device. In this regard, the mobile computing devices described in this document can be used to perform general computing tasks, such as, however, limitation, web browsing, leggy processes, and the like. In the case of web browsing, a mobile computing schism consistent with the present disclosure can run one or more web browsers, such as Google Chrome, Microsoft Internet Explorer, Apple Safari or similar. The user interface for such web browsers can be launched by the mobile computing device for a non-integral device. As discussed elsewhere in this document, a user can use o and interface devices attached to the screen or the mobile computing device to interact with applications running on the computing device, in this case, a web browser. In this way, a user can enter a web address with. an input device attached to the screen, which can cause the mobile computing device to access a web page associated with the address and launch the result display on the screen. 1.00170] With the proceeding in hand, the mobile computing devices described in the present document can be configured in some ways to download the confirmation of encoded video information from a wide area network (for example, a streaming video) to a non-integral paired screen. In that regard, the mobile computing device may include one. download module that includes computer-readable download instructions that, when executed by a processor, can do with. the mobile computing device to direct or otherwise transmit encoded video information received from a wide area network to a non-integral paired screen. [00171j Information associated with the encoded video (for example, information that appears around the video coairicado ® a website) can be processed by a web browser application running on the mobile computing device. The mobile computing device can then capture the temporary storage resulting from the frame output produced by this processing and launch it onto the paired screen. (00172j The paired screen may include a decoding module that includes computer-readable decoding instructions that, when executed, cause the screen to decode encoded video data received from a mobile computing device (including encoded video downloaded by that device This can reduce the processing load on the mobile computing device, which can in turn increase power over its lifetime. Additionally, the decoding instructions, when executed by a processor for the screen, can make the screen reproduce the information surrounding the downloaded downloaded video (for example, associated web information) on a display, and tenderize / display the downloaded video decoded in an appropriate location within the displayed information. The mobile computing technology described in this document may allow a computing device mobile use download encrypted video data that decodes operations to a remote screen while potentially providing one. uninterrupted user experience with video data and associated information (e.g. web information) expired for. receiving sensor data corresponding to a gesture. In any case, if the mon. iteration does not have to continue, the method can proceed to block 1108 and close. If monitoring has to continue, however, the method can proceed back to block 1302 and repeat. 1.00.1 / 9] If the monitored sensor data will correlate to a gesture in the gesture database, the method can proceed from block 1304 to block 130b, where the gesture instructions can cause the device and computation to move perform an action related to the gesture. The nature of the action may depend on several contextual factors and other parameters, such as, but without limitation, which applications (if any) are currently running on the mobile computing device, if any standard action control, gesture characteristics made with the mobile computing device (for example, sensor data indicating a relatively large movement / gesture can be associated with. one type of action, while sensor data indicating a relatively small movement can be associated with another action), combinations of the same and similar. Similarly, a gesture in the taste database can be correlated with the start of an application (if the application is not running), as well as specific actions within the application (if the application is. Running). Thus, for example, a gesture that indicates a move to the left of a mobile computing device can initiate one. first application, if the application is not running, then the first application is in. execution, however, the same movement to the left of the mobile computing device can be correlated to a specific action within the application, for example, audio controls, social network updates, etc. combination of the same move to the left and a push of a button (or other input received from an input device) with a second action, for example, running a second application, running a second action within the first application, etc. i.001 tij Since the action associated with a. gesture (or combination of gesture and entry) is carried out, the method can continue to block 1307, in which the gesco instructions, when executing them, cause the mobile computing device to perform a determination to determine whether the sensor / device is active. inbound monitoring should continue. If monitoring has to continue, the method can go back to block 1302 and repeat. But in. if not, the method can proceed to block 1308 and close. [00182] As described above, the mobile computing devices of the present disclosure can enable a user to launch and / or interact with applications on a mobile computing device, even if the mobile computing device does not include a display j.,. itegr 1. 3.11, .0, .. ,,. a c. ríguia.,. 3 and the arim description. l or touch application startup and / or interaction with the use of a gesture-based protocol, the use of gestures is not required. In fact, the mobile computing devices described in this document can be configured so that application launch and / or execution of actions within an application can be correlated to one or more entries made via input devices (for example , buttons, touchpads, etc.) and / or non-motion sensors (for example, microphones, cameras, etc.) coupled to the mobile computing device. The nature and operation of these methods may be similar to those described in Figure 13, except for. as the gesture database can be replaced and / or augmented by an input database that correlates specific inputs (for example, button presses, touchpad presslon, voice information, [0018: 31 As a non-limiting use case consistent with the methodology in Figure 13, the mobile computing devices described in this document can add a processor that is configured to run an operating system (for example, ANDROID ®; IOS, etc.), one or more social media applications, and one or more management modules, each of which can be stored in a device memory. In addition, mobile computing devices can include one or more sensors (for example, gyroscopes, accelerometers, etc.), and a wireless communications interface that takes near or long-range communication capabilities using a or more wireless networks. The management module can correlate the sensor and / or input device with. one or more gestures, and correlate those gestures with one or more actions. These actions may include, for example, the miei a.liz action or the social media application and the automatic execution of status updates in the social media application. For example, sensor data indicative of a move to the left of the mobile computing device can be correlated in the gesture database to a gesture to the left, which in turn can be carried out or initiated by the launch of the media application. Similarly, the sensor data indicating a movement to the right of the mobile computing device can be correlated in the gesture database to a gesture to the right, which in turn can be correlated to the performing automatic status updates from the social media application. [00184] In operation, a user of the mobile computing device can start running the social media application by performing one. move to the left with the mobile computing device, optionally in conjunction with. depression one or more buttons and / or with an input from another input device and / or non-motion sensor. In such cases, the gesture instructions in the 'gesture' module can cause the mobile computing device to detect the sensor data associated with the move to the left, and correlate that data to the move to the left in the gesture database. Gesture instructions, when executed, can additionally cause the mobile computing device to perform the action associated with the gesture to the left, in this case the execution of the social media application. [00185] The user can then have the mobile computing device automatically update its status within the social media application by making a move to. The. right with the mobile computing device, optionally in conjunction with a press of a button (or other input device element), Gesture instructions ,. when executed, they can do with. that the mobile computing device detects sensor data associated with movement to the right and correlates that data to a gesture to the right in the gesture database. In addition, gesture instructions, when executed, can cause the device to computing device perform the action associated with the gesture to the right in the gesture database, in this case the automatic update of the user's status in the social media application, (00,186] In another non-limiting use case, the gesture module can match the sensor and / or input device inputs to alphanumeric characters, which can be output to a paired screen. This enables interesting opportunities where a user of a mobile computing device can write in the air, for example, while holding the mobile computing device or an input device coupled thereto, and the mobile computing device can translate the writing movements user list in alphanumeric characters for display in. a paired screen, [00.1.87] In some embodiments, the mobile computing devices described in this document can be configured to enter one. securely, for example, in response to user input (for example, a gesture, press! button etc.), and / or after the expiration of a predetermined period. In secure mode, access to resources on the mobile computing device can be avoided until the identity of one. potential user is verified. The verification of user identity can be performed using any appropriate authentication protocol, such as a password authentication protocol, a biometric authentication protocol (in cases where the mobile computing device is equipped with appropriate sensors and access to appropriate biometric models), combinations thereof, and the like, [001881 Alternative Or in addition to password and / or biometrics authentication, mobile computing devices can be configured to perform an oom gesture based on the authentication protocol to verify the a user's identity. In general, the gesture-based protocol monitors sensor data (alone or in combination with input device data), and compares that data to the security database that correlates certain sensor inputs to authenticated users of the mobile computing device. For example, the security database can correlate a first movement (optionally in combination with one or more button presses or another entry from an input device) to a first authenticated user, a second movement (optionally). · In combination with one or more button presses and another entry from an input device) to a second authenticated user, · and so on. If the input device sensor data detected by the mobile computing device correlates to an authenticated user, the mobile computing device may enter an unlocked state, in which the user is allowed access to the resources on the device. detected sensor and / or input device does not correlate to an authenticated user, however, access to the resources within the mobile computing device may be denied. [00189] The execution of the gesture-based authentication protocol can · be facilitated by the gesture module discussed above, or another module stored in a memory of the mobile computing device> For example, the gesture instructions, when executed, can cause that the mobile computing device performs gesture-based authentication operations consistent with. present disclosure when the mobile computing device is in a safe state. [00190] Reference is now made to Figure 14, which depicts an example of gesture-based authentication operations that can be performed or caused by executing gesture instructions when a mobile computing device is in a secure state. As shown, the method starts at block .1401. In block 1402, the gesture instructions, when executed, can cause the mobile computing device to monitor sensor data (associated with the movement of the mobile computing device or otherwise) and, optionally, data produced by one. or rial input devices (for example, buttons) in response to user input. [00191] The method can then proceed to the block 1493, in which the management instructions, when executed, can cause the mobile computing device to compare the detected sensor data and / or input device to an armaena.de security database in one. memory of the mobile computing device. Con f rm η o t ad an t e r i rm ή t e. security database can correlate sensor and / or input device data to one or more authenticated users of the computing device moves) In some ways, the security database calls for being an independent database that is maintained independently of other databases on the mobile computing device. For example, the security database can be stored in memory in a protected environment on the mobile computing device. 00192] term protected environment used in this document to refer to an execution environment on the mobile computing device and / or non-integral screen, and which includes memory processing of resources that are isolated or otherwise protect from other components of the authentication device using hardware, firmware, software or one of them. [00193] The memory enclave technology in combination an example of a protected environment can be used in the mobile computing devices of the present disclosure. In general, non-integral screens and screens, a memory enclave can be composed of at least one page, of memory that has a different access policy than the imposed policy. per traditional ring limits of a computing system (in this case, an authentication device). The memory page (s) in a memory enclave may have associated read / write controls, which can be configured so that the read / write controls have exclusivity over certain operating modes or privilege rings , such as system management mode or virtual machine monitors from an associated processor. The stored information and operations conducted was a secure enclave of an authentication device and can therefore be isolated from other information, operations, and components of a mobile computing device and / or non-integral display. In some embodiments of the present disclosure, a mobile computing device includes one or more memory enclaves that are configured to temporarily store one or more unencrypted or encrypted security databases. [00194] Another example of a protected environment that can be used on mobile and / or computing devices. non-integral screens of the present disclosure is a reliable execution environment (TEE). Generally speaking, ura. TEE is a secure environment that can run simultaneously on an operating system and can provide secure services for that operating system. More information regarding TEEs and their deployment can be found in the TEE client application (API) programming interface specification vl.0, the internal TEE (application programming interface) API specification vl.O, and the TEE vl system architecture. 0 issued by Global Pl at form In some embodiments, the mobile computing devices and / or non-integral screens described in this document include a TEE that was provided using one or more of the virtualization technology, memory page protection, accentuated by uCode, CPU cache as security coprocessor technology and memory page protection. Non-limiting examples of this technology include VT-x virtualization technology from. INTEL ·: ®, INTEL® virtualization technology VT-d, INTEL® reliable execution technology (TXT), acceleration and Xeon internet security (ISA) cache as RAM, converged security engine technology (CSE) , converged security and manageability technology (CSM.E) technology, a security coprocessor, manageability mechanism, reliable platform module, platform reliability technology, ARM TRUSTZONE® technology, combinations thereof, and sim.il ares. The nature, advantages and limitations of each of these technologies are well understood and are therefore not described in this document. [00195] In some modalities the security database can be integrated with the security database noticed gesture above, No previous case, the performance of operations safety gesture-based about other operations by g instructions this can be conditioned on the existence of relevant contextual factors, such as whether the mobile computing device is not in a safe mode. [00196] In any case, the method can proceed to block 1404, in which the management instructions, when executed, cause the mobile computing device to determine whether the detected sensor data and / or input device correlate to an authenticated user in the security database. If the detected data does not correspond to an authenticated user, the method can proceed to block 1405, where the management instructions, v, A oi 'can cause the mobile computing device to determine whether it should continue to monitor the sensor data and / or input device. If monitoring is to continue, the method can return to block 1402 and repeat. If monitoring stops, the method can proceed to block 1407 and terminate. In some embodiments, the determination made in accordance with block 1405 can be conditioned on whether a predetermined period of time has expired or not. [00197] Returning to block 1404, if the detected sensor and / or input device data correspond to. one. authenticated user, the method can proceed to block 1406, where the gesture instructions, when executed, can cause the mobile computing device to enter an unlocked state, whereby access to resources on the mobile computing device can be guaranteed. The method can then proceed to block 1407 and terminate. <'5 J. .1 C-fA t .. .1. V l / S θ.ΧβΟΙ.Ι k - <- xó ; , iS lio eomput device a mobile and displayed et a non-integral screen .. [00200] Ά respecting, the mobile computing devices described in this document may include an input device module stored in a memory thereof. The input device module can include input device instructions that, when executed by the mobile computing device, cause the mobile computing device to produce a digital pointer such as a mouse cursor on a non-integral screen. For example, the input device module when executed can cause the moving computing device to insert a digital pointer in the video output of an operating system or other application run by the mobile computing device., As a result, the display of the pointer types.:, it can be launched to the web not integrated together with the display associated with the operating system and / or application. [00201] In some modalities, the device instructions; input, when executed, can induce insertion of a digital pointer in the temporary frame storage of an application and / or OS executed on a mobile computing device. As a result, the digital pointer can be captured in conjunction with frame temporary storage, for example, when the mobile computing device, runs a frame launcher and / or flow launcher protocol to launch the display associated with the application and / or operating system for a non-integrated screen. Due to the fact example, horizontal and / or vertical pixel coordinates}, which can be linked or otherwise defined by the dimensions and / or resolution of the launched display. Input device instructions can also cause the mobile computing device to update the two-dimensional screen coordinates in response to a detected change in the sensor and / or input device data, and move the digital pointer accordingly. [uOts.l] Input device instructions. they can also cause the mobile computing device to correlate certain movements and / or input (represented by corresponding data) to one or more input device actions, such as a right / left click, left / right double click, drag, swipe, combinations of them, and the like. In this way, the device instructions. input, they can convert movement and / or inputs made with the mobile computing device into actions that simulate traditional operations of a computer mouse, resulting in potencylw.en.te in. a familiar user experience. [00204] Reference is now made to Figure 15, which depicts exemplary operations that can be performed or caused by the execution of input device instructions in an input device module, consistent with. present revelation. As shown, the method starts at block 1502. At block 1502, input device instructions, when executed by the mobile computing device, can ciisposxtivo of entry with a. purpose of performing a corresponding action within the application and / or OS. (00206i As an example, input device instructions can report the OxbpQSx input files even to an active OS / app true that correlates to a digital pointer movement. e.ia> .. qx. ius pouem know. linked to the application / OE to insert the digital pointer into its temporary zenamonLo ce frame in an appropriate location (s), so that the digital pointer appears to move correctly in the launched display. If the input device instructions report the occurrence of an input device event, such as a double click to an application / OS, those reports can be configured to cause the app to run operations. consistent with that event in view of the contextual location of the digital pointer. For example, when the digital pointer is above a system shortcut icon, operating that is attached to an apiicaxivo and input device instructions reflect a double click event to the OS, the OS node performs a double click operation on the shortcut icon, this may result in the application running the shortcut running on the mobile computing device. LúOzO. 'The method can then proceed to block 1x06, in which the input device instructions, when executed, can cause the computing device to move to make a determination as to whether to monitor the sensor / device data. connected. snow continue. If monitoring is to continue; the method can return to block 1502 and repeat. If monitoring stops, the method can proceed to block 1507 and terminate. [00208] The mobile computing devices described in this document can also be configured to enable user interaction with an operating system and or application through one or more input devices that are wired or wirelessly coupled to the device. mobile computing. This concept is illustrated in. Figure. 16A, on which input device. 1601 is coupled with the mobile computing device 101, which is launching its display to a non-integral screen 103. As non-limiting examples of suitable input devices, · .mention is limited to mice, keyboards, trackpads, touch screens, trackballs wired and wireless computer, combinations thereof, and the like. Without limitation, input devices are preferably wirelessly coupled to a mobile computing device., Using a wireless communication protocol such as BLUETOOTH ®, near-field communication, WiFi, radio-communication. ., infrared communication, or a combination thereof. These protocols and modes of communication are well understood in the art, and therefore are not described in detail in this document. [00205] The interaction with an application / OS with the use of an input device can occur in a very similar way as described above a connection with Figure 15, except that the conversion of the monitored sensor data may not be required. For example, the mobile computing devices described in this document may include an input device module that includes input device instructions that, when executed by a processor, cause the mobile computing device to perform device operations. input consistent with the present disclosure. In this regard, reference is made to Figure i6.a, which illustrates an exemplary method of interaction with an Ot / application using an input device coupled with a mobile computing device consistent with the present disclosure. [00210 as shown, the method starts at the block 1602. In the block 1603, the input device instructions when executed, can cause the mobile computing device to monitor incoming device events received from an input device, coupled to the mobile computing device. For example, the instructions, when executed, may cause the mobile computing device to monitor input device elements received from the input device shown in Figure 16A. Input device events include, without x imitation, movement of the input device, a left / right click, a left / right double click, a touch, a finger slide, a drag, combinations thereof, and the like. [00211] The method can then proceed to the block where the input device instructions can cause the mobile computing device to re.i.come input device events detected to your n Cc> δ / or application executed·. For example, input device instructions can make information related to input device events available to the OS and / or a. an app with access to this information. In. In some embodiments, the input device instructions may cause the mobile computing device to deuectact true tutors may be relevant to the movement and / or operation of a d-igivâi pointer, such as such as a location. , cursor (oor exempio, cooroenada.s of pixels correlated to a two-dimensional screen), movement (i.e., change in pixel coordinates), and interaction events, such as clicks, drag, etc. The factors obtained from the input device events can then be r. to the 03 / application, which can use these factors to insert a digital pointer in a relevant frame temporary storage. [002.12] The method can then proceed to the itOt block, where the input device instructions cause the mobile computing device to execute the result of the input device event. By a.A.i-mpj.ij, if the input device event is indicative of the movement of a coupled input device, the input device instructions may cause the uan / application to insert a digital pointer into one. appropriate location and update its position so that it moves consistently with the movement of one. coupled input device. Similarly, if the input device instructions report the occurrence of an input device event, such as a double click to an OS application, these reports can be configured to make the / 08 application perform operations consistent with aou.ele double click event in view of the contextual location of the digital pointer. For example, the digital pointer is attached to a shortcut icon on an operating system that is linked to an application and input device instructions report, a double click event to the OS, in which the OS can perform an operation double-click the shortcut icon. luOllij In block 1605, the input device instructions, when executed, can cause the mobile computing device to make a determination as to whether the input device event monitoring of a coupled input device should continue. If the monitoring continues, the method can return to block 1603 and repeat. If the monitoring does not continue, however, the method can continue for bioco 1607 and terminate. [00214] Another aspect of the present disclosure refers to the technology to enable interaction with an operating system and / or application running on a mobile computing device with the use of one or more devices connected to a non-integral screen that is paired with the mobile computing device. As will be described below, the non-integral screen (for example, smart / dumb) can be configured to monitor input device events generated by a di, position, and input that is wired or wirelessly coupled to the screen . After, optionally, adjust the detected events to compensate for differences between the void and resolution of the web, and the expectations of an orb / application running on the mobile computing device (for example, one reflected by the size / ratio of the output). launched), the screen can report detected input device events to the mobile computing device. The communication of the input device events can occur through a. channel a and support is open between the non-integral screen and OAsposi. movable computing, as described above. The mobile computing device can be configured to receive these reports (for example, through the support channel) and make the information contained therein available to an OS / application running on the same, ü OS / application can use these information to run one or more operations related to the detected event. f 00215] As one. non-limiting illustration. of this concept, reference is now made to Figure 17A, in which the mobile computing device 101 is illustrated as paired with a non-integral screen 103. Screen 103 and the device >>. i. 11. v to mobile computing 101 can be paired to the appropriate format, including any of the pairing protocols previously described. In that case, the computing device moved 101 and the web. 103 are illustrated as being paired so that communication between them is bidirectional. For example, the mobile computing device 101 can transmit video information to the screen 103 via the advance channel (example color, socket). Screen 103 can receive the imoxsfactions c viaeo and render / display them on its display, the same as described above. Similarly, ce., 1033 can transmit information to the mobile computing device 101 via a scanned support channel or during the pairing process. [00216] As further shown in Figure 17A, screen 101 can be wired or wirelessly attached to input device 1701, The i / L · input device. it can be any suitable input device, such as those described above. For the good. of the illustration and tacilida.de of discussion, the input device i / 01 is illustrated in Figure 3 7A as a computer mouse. LtOzi./] tara, enable a user to interact with an OS and / or application with input device 1701, screen 103 asks to be configured as a smart or dumb screen that includes a memory with an input device module stored in it , as well as sufficient processing capacity (in the form of an application-specific or general processor} to execute computer-readable input instructions on the input device module. In addition, the .1.03 screen may have wired / wireless communication capabilities. which enable it to send and receive data signals through the communication channels (forward channel and support channel) established between it, and the mobile computing device 101. is CcA.spob it iy ».j αθ entracia., When executed by a processor, may cause the screen 101 to perform input device monitoring and report operations consistent with the present disclosure. In some modalities, the input device module may include or be in the form of code readable by compucaaor, which may be in JAVA or another computer programming language. Although the present disclosure vis-à-vis the modalities in which a screen is pre-provisioned, you are a part of a device. appropriate entry, that pre-px is not required., In tact, a few roooaxiciades, the means of input device, can be txansmiuioo a. from a computing device I moved to a screen. For example, the input device module requests to be transmitted from the mobile computing device, to the web during or after they are paired. [00218] Reference is now made to Figure 17B, which depicts, an exemplary method for detecting and reporting input device events, with a non-integral screen. This method can be considered exemplificative of the operations that can be performed or induced by the execution of instructions of input device by a processor of a non-integral screen that is paired to a mobile computing device. i00219] As shown, the method starts at block 1702. At block 1703, input device instructions when executed by a one-screen processor can cause the screen to monitor input device events generated by r or more ρ and r i. ό .c c a s. j Ο monitoring of input device events may include a. determining the location of the event on the screen. In cases where the input device accepts> p.a..o.o «. screen and a mouse for example, input device instructions can cause the screen to determine the pixel coordinates of a digital pointer on a screen display as the event occurs. If the event causes a mouse click, for example, the input device instructions can cause the web to determine the pixel coordinates of an original pointer on a screen display at the time the mouse click was detected. A range of pixel coordinates can be determined for more complex events, such as a click and drag operation, a click, hold and drop operation, combinations thereof, and the like. For example, the instructions for the input device, when executed, can cause the screen to monitor the pixel coordinates of a digital pointer in one. display of the screen corresponding to the event initialization (for example, a click and hold initial) and the pixel coordinates of the aontoiro aigitai in the event na (for example, a release), [00zz2J In a similar way as when the input device coupled to the screen is a touch screen, the input device instructions, when executed, can cause the screen to determine the pixel coordinates of one or more togues made on the screen, sensitive to touch. For example, input device instructions may cause a. screen determine the pixel coordinates in a display of the screen that coxzeiacxone to a touch events. For repeatedly simple touch events (such as a single touch), the input instructions may cause a. screen determine the pixel coordinates of the single touch on the screen display. For relatively complex touch events (for example, multiple touches, finger slides, pinches, sweeps, etc.), the input device instructions can cause the screen to determine a series of oixel coordinates corresponding to the event. In the case of a slip slip, for example, the input device instructions can cause the screen to determine the pixel cooreations at the beginning and end of the finger slip, and optionally between the beginning and the end of the finger slip. finger. [uúlzc ·] In any case, the method can then proceed to optional block 1704, in which the input device instructions, when executed, may disappear with which to. screen adjust pixel coordinates associated with an input device event to compensate for differences in the size and / or resolution of an axis. screen and the size and / or resolution of the display that is launched to the web from a mobile computing device. In other words, input device instructions can cause the screen to apex a scaling device, or other mathematical device to adjust the pixel coordinates determined so that they are consistent with the native resolution of the display launched at from a mobile computing device .. [00224] As an example, a mobile computing device can launch a display that has one. resolution of 640 pixels by 480 pixels for a screen> The screen can include a display that is twice the resolution of the display launched, that is, 1,280 pixels by 960 pixels. In some modalities, a. The launched display can be enlarged by the screen to fill the entire area and its display. The screen can then monitor events from the input device and record pixel coordinates associated with those events, as described above. Due to the fact that the screen resolution is the native resolution of the launch display, however, the pixel coordinates aecenninadas can be twice the value of the corresponding pixel coordinates of the launched display. To compensate for this, the screen can divide the pixel coordinates determined by two, so that they are, dimensioned to the native resolution of the launched display. L9022c] Once the determined pixel coordinates are adjusted or if no adjustment is made, the method can proceed to block 1705. In co-ordination and with this block, input device instructions, when executed, can cause the screen to transmit data signals containing input device information to a mobile computing device via a back-up channel. In general, data signals are configured to report input device events and information associated with the mobile computing device, ü mobile computing device can be combined to receive these signals and provide the information contained therein to an OS and / or application running on the mobile computing device. tuOziQj um. some modalities, the input device instructions, when executed, can make a screen pack information relevant to the detected input device events, transfer those packets to a mobile computing device in a data signal sent through the data channel support. Packages can have information relevant to an input device event detected by the screen. For example, the j..n <„, i packets in the data signal may have a header that identifies the source of the signal, that is, the screen in question. Packages can include postponements. Initially a command iGentizicador. The command identifier can include the identity of the type of input device (for example, a mouse, touchscreen, teeiaao, etc.), the nature of the detected input device event (for example, a dike, a touch , a finger gesture, a key press, etc.), other relevant information, or a combination of the same. Packets- may also include a load portion, the containing of which may be different depending on the nature, and type of incoming device event being reported. [0022 / J of the cases in which an input device event was produced by a mouse or screen. seriable to the touch coupled to the screen, the carcass portion of the packages can include information relevant to the beginning, rim, or other pixel coordinates of a forward cursor. the screen, potentially as adjusted in accordance with block 1704. In cases where the input device event is a vacuum pressure and a weave.Q coupled to the web, the load charge of the package may include the key identity that was pressed, [00222] As noted earlier, the computing devices that are not included in this document can be configured to receive data signals from a screen, such as those described above. In such cases, the mobile computing device may include an input device module that has input device module instructions, which when executed by a mobile computing device processor cause the mobile computing device to decode the packets contained in the received data signal. More specifically, input device instructions, when executed by the mobile computing device, can do with. the mobile computing device to analyze packets on a received swim signal to determine the type of input device event and the location of the event (for example, the pixel coordinates of the event, potentially as normalized by the screen to the native resolution of the launched display). [00229] The information obtained can then be provided to an OS and / or application running on the mobile computing device, as described above. The OS and / or application can handle the input device information provided in this way as normal input device data, i.e., data that can be traditionally obtained from one. input device coupled to the mobile computing device. That is, the OS and / or applications running on the mobile computing device can apply the input device event information provided by a screen to induce a result that correlates to the detected input device event. L 0u2 a o] Returning to Figure .17.8, one. Once the screen has transmitted a data signal that contains input device events, to a mobile computing device, the method can proceed to block 1706. In accordance with that block, input device instructions when executed by a processor, the web can cause the screen to make a determination as to whether monitoring of input device events should continue. If this monitoring is to continue, the method can return to the pi.i./0.5 and repeat. If this monitoring is not to be repeated, however, the method can proceed to block 1707 and terminate. [00231] As can be seen from the above, the input devices integral to and / or coupled to a screen, can be used to interact with and / or control resources executed in a mobile computing device paired with the screen. In some embodiments, input devices paired to a web can be used to enter commands, textual samples, and perform input device operations. These commands, inputs, and operations can be transferred across the screen to the mobile computing device. through a stationary support channel, as described above. Upon receipt, the mobile computing device can be configured ... to execute the result of these commands, inputs, and operations. This capacity can be leveraged. to enable several interesting use cases was that a user can control and / or access resources on a mobile computing device through a non-integral screen paired with the mobile computing device. LvMjztíSj As a case of exemplary use, a mobile computing device may include a memory that has a photo sharing application on it. The photo sharing application may have access to broken and, optionally, other media stored in the mobile computing device or otherwise accessible to the mobile computing device (eg stored in cloud / internet storage). The photo-sharing application can include instructions that, when executed by a processor from a mobile computing device, cause the mobile computing device to emit the video corresponding to one. graphical user interface of the application for temporary frame storage. The mobile computing device, can be configured (as described above) to capture the 129/274 mobile computing, the mobile computing device can optionally be configured for. allocate control through your resources to one or more of the paired webs. Figure ISA, the device o.e mobile computing 101 can be paired simultaneously with three screens, the screen or: .. 103 , and lujr ... In some modalities, each ma of screens 103 /, lü3 :: <, 103 ,. it may have the ability to access or otherwise control resources on the mobile computing device 101, for example, using one or more input devices. Alternatively or in addition, the mobile computing device 101 may limit control and / or access to its resources to a subset (for example, 1. or more) of screens 103m 103 , 103 ,,., For example, the mobile computing 101 may allow screen 1031 to control and access its resources, but it may deny that access and / or control to screens 103 2, 103 .. «, [00236] In this regard, the mobile computing device may include a memory that has an access control module stored therein, whereas the access control module includes harassment of instructions. when executed, they cause the mobile computing device to perform access management operations consistent with the present disclosure. Consistent with the previous discussion, access and management operations may include alo falls and / or limit access and / or control through the resources on the mobile computing device to one or more paired screens. Χοχ · example, the access instructions, when executed, can cause the mobile cumpatéi.çao device to transmit or otherwise allocate a token to and access all, some or none of the non-integral screens with which it is paired . In some modifications, the allocation of the token to a paired screen can be initiated in response to a gesture or other entry made with / through the mobile computing device. For example, the mobile computing device can be configured so that a user can allocate access to a particular paired screen by gesturing towards the web in cues. I. üíJzfi] The access token can be configured to specify the degree of access that is given to a paired fool. For example, the token can be configured to limit screen access to certain system resources or the mobile computing device ( for example, critical system resources, OS definitions, etc.), while providing unrestricted access to resources associated with a particular application (for example, the photo sharing application noted above). The nature and configuration of the access token may be different between the webs and the cancellation, thus the mobile computing device to individually control the degree to which the paired screens can simultaneously access and / or control its resources. (002,581 Reference is now made to Figure 18B, which illustrates a non-limiting stacking method for a mobile computing device with multiple full national screens. And access management and / or control of resources on the mobile computing device with one or plus control token · s. As shown. the method starts at .oloco 1-801. In block 1802, a movable hooking device can be placed in a continuous transient pairing mode. In this mode, a mobile computing device may be available for use with. multiple non-integral screens. The method can then proceed to block 1803, where the mobile computing device is paired with multiple non-integral webs. Q pairing the mobile computing device with. each screen can be made using any suitable pairing method, which includes the pairing methods described above in connection with Figures 5A-7B. Therefore, for the sake of brevity, a detailed description of the pairing process of each screen with the mobile computing device is not reiterated. [00239] Once the mobile computing device is paired with. multiple non-integral screens, the method can proceed to block 1804, where the mobile computing device can transmit or Λ launch its display to the paired screens. The video transmission to each screen from the mobile computing device can occur with the use of any suitable method, including the methods described above above, in connection with the transmission of a display from a mobile computing device, to a single screen. So, for the sake of brevity, the way in which the mobile computing device transmits a display to each fool in. Compliance with block 1804 is not described in detail. 34/274 [00240] The method can then proceed to block 180b, in which the mobile computing device can transmit control taken to all, some, or. none of the paired screens, As noted earlier, the control token (s) can be configured to limit or otherwise specify the degree of access and / or control that the paired screens have to the resources on the mobile computing device . For example, the mobile computing device can transmit a control token to a first paired screen, but it cannot transmit a control token to a second paired screen. In this case, the first paired web can access and / or control the resources on the mobile computing device, up to the point specified by the control token. Due to the fact that the second paired screen lacks a control token, it can have access to and / or control the resources denied on the mobile computing device. As can be appreciated, this can enable a user of the first paired screen to control applications and other resources on the mobile computing device, and therefore control the content of the video that is launched to the second (and first.) Screen from the mobile computing device. [00241] Once the mobile computing device has transmitted one or more control tokens, the method asks to proceed to block .1806, in which the mobile computing device monitors the reception of input / control signals from the screens paired files that have a tracking token. In some embodiments, the input / control signals may be in the form of data signals that contain input device event reports from a paired screen, as described above. Of course, the input / control signals do not need to correlate with the data signals that contain the event reports of the input device, and can be configured in any suitable way. For example, the input / control signals can include one. or more commands that dictate an execution of operations specified on the mobile computing device. [00242] The method can then proceed to the block 1807, at. than the computing device. mobile can perform the result of the input / control signals in an appropriate application and / or OS running on the mobile computing device. For example, if an input / control signal dictates opening an application, the mobile computing device can open the application, provided that the screen it emitted, the input / control signal has been granted sufficient access to / controls over resources. relevant information on the mobile computing device. 1.0024.3] In block 1808, the mobile computing device can be configured to make a determination as to whether monitoring by input / control signals from one. or more paired screens must continue. If this monitoring continues, the method can proceed to block 1809, where a determination is made as to. whether the mobile computing device will transfer or change control S lixl l ciX '· 3 S [.Uuz4 / j Out.ro aspect o this disclosure refers to the technology to control data retention by a non-integral screen gne can be paired or embedded with a mobile computing device. As can be appreciated, a mobile commutation device oocR. Transmits significant amounts of video and / or other information to a non-integral screen with ousl paired and / or docked. A security concern may therefore arise in relation to. retention of this data and information by the non-integral screen after it is no longer paired with a mobile computing device. In fact, all or a portion of the video and other information transmitted to a non-integral screen from a mobile computing device may remain in memory or other resources. Similarly, if a mobile computing device transfers one or more applications to a screen (for example, to enable pairing or for another purpose), those applications may remain on the non-integral screen after it is no longer paired with a device. mobile computing. As a result, these applications and data may be susceptible to being obtained by malware, a hacker, or unauthorized third parties, targeting a screen, not integrated. t00z4ãj To address this problem, the screens are not xix ... egx a ... a o.vs <.a ... l <.. aa nu presence ooeumunuo posciem. be configured to exclude information received from a mobile computing device, upon the occurrence of one. termination event. Non-terminating event examples include terminating the connection between a silly moving computing device, receiving a termination signal on the screen, expiring one. specified period of time, communication activity that exceeds a predetermined limit (attack to intermediaries, attack CtO cwnagem), combinations of the same and similar. lOOzaij The non-integral screens described in this document can also be configured to store or otherwise maintain applications and other information received from a mobile computing device in a protected environment, such as a secure memory device, a comfortable execution environment, or a combination of them. The protected environment can additionally store a temporary storage module that includes computer-readable temporary storage instructions that, when executed by a processor, cause the screen to exclude applications and other information received from and a computing device. mobile upon the occurrence of a termination event, for example, from memory in the secure environment and / or other locations on the non-integral screen. tOUãcU] For example, the non-integral screens described in this document can be paired with a mobile computing device, as described above. Since a communications channel is stationary and gone with the mobile computing device, teak can monitor the communications channel by receiving video and other information (for example, applications) from the mobile computing device. The information received from the mobile computing device can be stored in a memory on the screen, such as temporary video storage, data storage, other type of memory, uOâibinâçOejí thereof. the similar. That memory may be in. a protected environment maintained on the screen, or elsewhere, or in any form, the screen can then input video information and / or run applications received from the mobile computing device., [UOzaij Simultaneously, a screen processor, can execute temporary storage instructions on a temporary storage module stored on the display. The temporary storage instructions, when executed, can cause the screen to monitor the occurrence of a termination event, such as those described above. Upon the occurrence of a termination event, temporary storage instructions, when executed, may cause the screen to delete any or all information received from the mobile computing device, which includes video information, applications, and / or other information, lOüçiíz] The webs described in this document can store video and other information received from a mobile computing device in encrypted or unencrypted form, in the previous case, the screens described in this document include an a and encryption module, the which can be stored in a memory, the encryption module can be pre-supplied in the screen memory., or it can be pushed to the screen, from a mobile computing device, for example, cow pairs of a protocol pairing Either way, the encryption module can include computer-readable instructions that, when executed by a screen processor, cause the screen to encrypt video data and other information and applications received from a mobile computing device. In some embodiments, the instructions and encryption, when executed, can also cause the screen to keep the encrypted video and other information in an encrypted state until the use of this information is necessary, for example, to render / display an image on a screen display, puanao the information is necessary, the encryption instructions, when executed, can cause the screen to decrypt the encrypted information. In some ways, the information may remain in an unencrypted state for as long as necessary to carry out an action that uses this information. Once the action is completed, or at another time, the encryption instructions, when executed, can do with. the screen to encrypt the information again. Alternatively, or add, the temporary storage instructions on the screen, when executed, can cause the screen to delete the decrypted information that is no longer used by the screen. [002531 Conform © described above, the mobile computing devices of the present disclosure can be configured to transmit their broadcast from the display to one. or more non-integral screens. In addition to this capability, mobile computing devices in some mcdandae.es can also be configured to include advanced network connectivity. For example, the o.i. The mobile computing elements described in this document can be configured so that they can communicate with the use of one or more forms of communication in short range, one or more forms of communication in long distance. combinations of the same-s and the like. In this regard, reference is made again to Figure 2, in which wCqflMS and illustrated as including hardware and / or software that has the ability to communicate over WiFi, NFC, FFID, BLUETQOW, a cellular network, a network of blank TV space, or a combination of them. Obviously, these forms of communication are only exemplary, and WCOMMS 2 04 need not include the illustrated combination of forms of communication. In fact, WCOMMS 2 04 can be configured to enable the mobile computing device 101. to communicate with any desired communication mode or to define communication modes. [0t2o4j In some embodiments, the mobile computing devices described in this document may have the ability to communicate with a wide area network (for example, an internet) using one or a combination of different communication modes, such as such as those described above and illustrated in Figure 2. In cases where a mobile computing device is within the communications range of an access point on a wide area network, it can communicate directly with the access point with the use of an appropriate hand and communication. If an access point to a wide area network is not within the communication range however, the mobile computing devices described in this document can be configured to communicate with other devices within the range, in an attempt to establish the communication with the long distance network. In other words, the mobile computing devices described in this document may attempt to establish and / or support a mesh network, which enables a mobile computing device to transmit and receive data signals over a wide area network over one. or more intermediate devices. IÜ0255J For example, a first mobile computing device may have the ability to communicate over WiFi and communicate via NEC, which the first mobile computing device can use in one. attempt to communicate with a wide area network, such as the internet. If an access point for the wide area network is not within communication range however, the first mobile computing device can be configured to communicate with other devices within a.icance, and that can be leveraged by the first device mobile computing, to establish a communications path for wide area network. For example, the first mobile computing device can transmit data signals a. a second mobile computing device that is within communications range. The second mobile computing device. sex substantially the session that the first mobile computing device., or it can be different, however, the second mobile computing device can be configured to relay the signals of damage received from other computing devices. mobile, for example, to a long distance network (if the network is within the communication range of the second computing device), or to other mobile computing devices within range, this process can continue beyond the signal if data is sent from the first mobile computing device reach an access point for the wide area network. Data signals from the wide area network can be retransmitted in a manner similar to the first mobile computing device, for example, if the first mobile computing device remains outside the communication range of one. WAN access point. [00256] The previous concepts are illustrated in general in Figure 20, which depicts an exemplifloative mesh network that includes one or more mobile computing devices consistent with the present disclosure. As shown, Figure 20 includes the mobile computing device i01u, .ha modality i. polished, the mobile computing device 101i has a set of wireless communications circuits that have the ability to use a long-range communications network such as a cellular network to communicate with the 2002 wide area network (for example, a internet), iOüZb / j Uonrorme shown additionally, the network in ma.À.ha ixustrao.a. mciui mobile computing device 101s> In the illustrated mode, mobile computing device Is.:.;· does not have the ability to communicate with. the 2001 mobile phone network because it is out of aican.ce, lacks cellular network connectivity, or lc.í. conrigurano to limit or avoid the use of cellular network (as will be described below)., However, the mobile computing device 1022 can leverage other modes of communication to communicate with the long distance network 2Ό02. For example, the IO12 mobile computing device can send data signals to the IOI.3 mobile computing device. Due to the fact that the IOI3 mobile computing device may not be able to communicate directly with the 2002 long-distance network in the illustrated modality, it can retransmit the associated signals received a. from the mobile computing device 101, · to other devices / networks within range, in this case, the mobile computing device. 1 () 1 ,,. The mobile computing device 101 ,, can route the received data signals to. from the mobile computing device 101.3 for other devices / networks within your reach and communications, in this case a. white space network to and N1F1 / television (TVWS) 2003, because the WlFi / TVVvd surround may also not have the ability to communicate directly with. the 2002 wide area network, it can retransmit the received data signals to. from the lOlj mobile computing device to other devices / networks within range, signals ions via the W1F.1 / TVWS 200.5 network from household 2 00'6 for the WiFi / TVWS 2004 backhauler, and finsiBients for the 2002 wide area network. Similarly, the mobile computing device .1.01. 4 can be configured to receive data signals from the long distance dongle 2 002 which are routed through the same or other e.Letters of the mesh network. [0025.9] A challenge with mesh networks is quality of service. That is, it can be difficult to maintain low user costs while maintaining reliable connectivity and bandwidth (ie, quality of service) over a mesh network. One aspect of the present disclosure relates to systems and methods to encourage use mesh network. A feature of these systems and methods is the use of a network management module that can be resident on each device in a mesh network. The network management module can include network management (NM) instructions that, when executed by a device on a mesh network, cause the device to monitor the amount of data retransmitted by the device through the mesh network. NM instructions, when executed, can also: correlate the relative amount of data to a prize, such as bandwidth credits, currency, or another incentive to provide bandwidth to other mesh network users, that prize can be leveraged by a user to purchase connectivity, bandwidth reserves for quality of service needs, or other merchandise, or service. [00160] As the number of communication options / channels available increases, it can become increasingly important for people to actively manage their needs in. the expense, capacities and cost of those various forms of communication. For example, communication over a cellular network can be expensive, particularly if a user has exceeded an assigned minute and / or data set. In these cases, it may be desirable for the user to use less expensive (although potentially less capable) forms of communication instead of more expensive (although potentially more capable) forms of communication. For example, a user may find it desirable to primarily use the network at. mesh, IJFi, and / or other relatively inexpensive forms of communication for certain actions, rather than relatively expensive forms of communication such as communication over a cellular network. [0 () 26.1.] With the aforementioned in mind, another aspect of the present disclosure concerns the technology to manage the form of communication employed by a mobile computing device, which includes those described in this document and other mobile devices such as telephones. cell phones, smart phones, tablet PCs, combinations thereof, and the like. As previously described, such devices can be equipped with wireless communications interfaces that enable various forms of communication, which include, without limitation, WiFi, NFC, Cellular, white space. dual service requirements, combinations thereof and similar < [002631 For example, it was a response to one. request to send a data signal, the CM instructions, when executed, may cause the device to xXJfnj.) òi..mÇâO ΠιΟνθ.Ι β.βα.ίΐ3Θ 't / SSCtS 1. êiCOXktS θ ρλ t'. V. '·> J'i; ci uPl level of urgency ac data signal. If the factors analyzed by the mobile computing device suggest that the data signal is not urgent (for example, it is below a first urgency threshold), the CM instructions, when executed, can cause the mobile computing device transmit the signal to coats using one or more relatively inexpensive communication modes, such as MiFi, MFC, another short-range communication, combinations thereof, and the like. If the mobile computing device determines that the urgency or data signal is somewhat urgent (for example, exceeds the first urgency threshold), CM instructions, when executed, may cause the mobile computing device to send the data signal using one or more communication modes that can be relatively more expensive, such as an o and IV blank space network, a pay-byte cellular network, satellite communication, combinations thereof, and similar. If the mobile computing device determines that the urgency of the data signal is too high (for example, above the second urgency threshold), the CM instructions, when executed, may cause the mobile computing device to transmit the data signal with the use of all communication modes available for it, regardless of cost. [00264) Similarly, CM instructions, QUârido executed, can cause an oomputing device to move, monitor bandwidth requirements of an application running on the mobile computing device and compare these requirements. bandwidth that can be available / obtained with various modes of communication available to the mobile computing device. Based on this comparison, CM instructions, when executed, can cause the application bandwidth requirements. In this regard, the mobile computing devices described in this document can be configured to maintain the quality of a service and, for example, for video θ other continuous data transmissions that can be specified by an application or other entity. [00265] With current electronic mail, continuous transmissions of information, continuous social transmissions, photos, music, films etc., individuals can claim large amounts (for example, gigabytes or even terabytes) of personal data. In. many '..s.'. ·. · o, t ·. , 'S' .. · s or a portion thereof may be kept in bulk storage. or another memory one is not kept in one. · mobile device of the individual. For example, an individual can store several gigabytes of photographs, applications, etc. on systems in addition to your mobile devices. To enable access to this information on a mobile device, services, such as box, Dropbox, iCloud and the like, have been developed, and, in general, operate. to provide central aggregation of data files in the cloud. While these existing services are useful, the user experience they provide may be limited. For example, many existing services ignore or segregate certain types of digital data, or force a user to select which data should be cached on the handheld. As a result, user intervention may be required to ensure that the desired data is stored in. a desired mobile device. This can be inconvenient, particularly if a user already has ready access to mechanisms to control data distribution. [00266] In some embodiments, the mobile computing devices of the present disclosure can be configured to intelligently cache certain portions of the user's personal data, files, streaming, and other digital content in local memory for the fob, while providing network access to other data stored at a remote location »As will be described below, the mobile computing device can use heuristics (for example, machine learning) and / or contextual information to determine what information to cache in memory, location of a mobile computing device, this can enable the device to intelligently cache the data a user wants on the mobile computing device, while reducing, minimizing, or even eliminating the need to use the interaction . [00267] In this regard, reference is made to Figure zí, which depicts an exemplary intelligent caching system consistent with the present disclosure. As shown, the smart caching system 2100 includes the mobile computing device 101 and the server 2101. For the sake of illustration, the mobile computing device 101 is shown in Figure 21 as paired with a non-integral screen, in However, the smart bundle storage operations described in this document can be performed without pairing the mobile competition device 101 to the screen 103. [0026 8] u server 2101 can be a system. remote computing device that is configured to send and receive data transmissions over one or more wired or wireless communications links. In particular, server 2101 can be configured to receive user data, for example, from the mobile computing device 101 or another source, and store that data in one. memory, such as memory 2105. In that regard, user data may be transmitted to and from server 2101 via one or more networks such as network 2103, or by another means, such a corona a direct connection to a mobile computing device. This concept is illustrated in the Figure. 21, in which the mobile computing device 161 is illustrated as being in two-way communication with server 2101 over network 2103. L002 63] Network 2103 can be any network that carries data. As examples of suitable networks that can be used as i'ede 2103 according to the present disclosure; the non-limiting mention is made of an internet, private networks, virtual private networks (VPN), public switched telephone networks (P-STN), integrated services digital networks (ISDN) f digital link and subscriber networks (DSL), wireless data networks (for example, cell phone networks), combinations thereof, and other networks that have the ability to portard. In some non-limiting modalities, network 102 includes at least one of the internet, at least one wireless network, and at least one cell phone network, [002 70] b server 2101 can be in the form of a single network. server machine or multiple server machines, which can be locally located or geographically distributed. As noted earlier, server 2101 can operate to receive user data from one or more sources, such as a mobile computing device 101. [00271] The 2101 server can store user data in memory. 21ü5, for example, as one or more files. Memory 2105 can be any suitable type of memory, such as the types of memory noted above for the mobile computing devices and displays described in this document. In some embodiments, memory 2105 is in the form of magnetic recording memory, non-volatile memory (flash), or a combination of ΓΠΛΰ S TQ3. S <. [002721 The mobile computing device 101 and the «hey vid.or 2.i. They can each include a cache management module (CMM) in the form of one or more computer-readable springs that have cache management instructions (CMT) stored in them. CM1s, when executed by a processor (for example, processor 2ι.0ζ), can cause the processor to perform intelligent caching operations consistent with the present disclosure. The CMM and associated instructions can be stored in memory that is local or external to server 2101, such as memory 2105. This concept is illustrated in Figure zl, where memory 2105 is illustrated as including CMM 2106. [00273] In some modalities, CHI, when executed by the 2104 processor, can do with. that server 2101 facilitates the distribution (for example, download transfer) of the definition information in the network storage 106 by one or more Mobile electronic devices or other electronic devices> The IMC, when executed, can do with. the service store user information in 210t memory, for example, as a user data file. The CHI instructions, when executed, can also cause the 2101 server to associate that file with a user profile (not shown) corresponding to a user of the computing device moved 161. 21c some modes, the network server. .ü5 popular poet a saneo of data with user information uploaded from one or more sources associated with a specific user profile. [002741 In some modalities, the CMI instructions, when executed, may cause the 21 Oi server to transmit or 'push all or a portion of the user data stored in memory 2015 in association with a user profile for the device computação movi 101. In some cases, the execution of the data push operation may depend on or be governed by information in the user profile. For example, the user profile can store information related to the user's data preferences, usage patterns, jobs, personal activities, other contextual conditions, combinations thereof, and the like. The CMI instructions, when executed, ask the 2101 server to monitor contextual information received from the most recent computing device 101 (for example, from one or more sensors on them), and to use that information (alone) or in conjunction with information in the user profile) to determine the type and nature of the data stored in memory. 2015 to push, to the 2101 mobile computing device. i.0O2 / t] This. In this way, server 2101 can intelligently determine which data in memory 2107 is pushed to the mobile computing device .10.1, for example, with. the use of heuristics, machine learning, or the like. This can also enable the 2101 server to serve as an consumer. Control over access to that information may therefore be desired. [uüznj Several services have been developed to help users prevent third parties from tracking their activities on a computer. As an example, a user can try to anonymize their activities on the internet using one or more proxy services. Generally speaking, a proxy service requires a user to log on to a proxy server portal, which can be operated by the user or a third party. Internet queries from the user's computer are routed through the proxy server portal, which redirects the query through one or more proxy servers to its pre-filled destination. During the course of this routing, the association of the consultation with the user is reactivated or removed, and is suost.itulda. with an association to the proxy server. As a result, the group that receives the query may not be able to associate the query with the user who generated it. [00278] Although existing proxy services can effectively anonymize a user, proxy servers are often not trusted by commercial entities such as e-commerce retailers. As a result, communications from a proxy server to coastal web suites (for example, for the purpose of making acquisitions or otherwise) may be ignored or refused. Existing proxy services may therefore not be able to enable a user to perform desirable activities from the computing device I moved 101, to anonymize these queries, and route these queries to service provider 2201. For example. the provider beiviçu 2 / 0.1 poctô be one. site cta wcb o a commerce ei «tion.ico that offers px'oautos for sale through the network. In such cases, the mobile computing device 101 can transmit a query that is directed to the bexviçp s.-iOi provider to the server ./1()2. The query may include, for example, a request to purchase items offered for sale by the service provider, server 2102 in response to receiving that query may anonymize the query, for example, by removing the identifying signs (for example, a IP address of the mobile computing device 101} of the query es uü & 111 ui ri do - seassesi η oic 1 osc with corresponding signals from server 2102. The server 2102 can then transmit the query anonymously to the service provider. 2201. [uOftz j Before, during, or after the transmission of the anonymous consumable, server 2102 can attest its iaem.iciaue to the service provider 22 01, for example, with the use of one or more attestation protocols. The exceptions are limited to the protocols mc / uem direct anonymity attestation (DAAj, improved privacy identification (EPin), remote attestation, combinations thereof, and the like. Server 2102 can perform this attestation by transmitting a signal certificate signed by an appropriate private key for the service provider 2201. Service provider 2201 can verify the authenticity of the private key with the use of a corresponding public key. If the certificate is successful, a root of trust can be scaled. between service provider 2201 eg server 2102. Once a root of trust is established, service provider 2201 can be used to trust anonymous transmissions from and from server 21.02, such as the anonymous query discussed above . 100283] Returning to the acquisition example discussed above, by establishing one. root of trust with the service provider 2201, the ziuz server can transmit the query unonimitably from the mobile computing device 101 to the service provider 2201. The service provider 2201, having •. • .η ·. · 'Uatelec. gone a root and contention with the servicior 2 /. 0-2, can be configured to treat the anonymous query as a traditional query. That is, service provider 2201 can serve the query, and apportion the response back to server 2102. Server 2102 can then route the response back to mobile computing device 101. · Before transmitting the response back to the mobile computing device 101, server 2102 can be configured to perform one or more operations on. answer. For example, server 2102 can analyze the response for malware, viruses, other malicious code, combinations thereof and the like, before transmitting it to the R O 1XÍO · '-ν' d. U J .. í [00284] As shown in Figure 22, server 2102 can include a proxy module (PM) 2202 stored in the mobile computing device, ie, mobile computing device 101. It should be understood that the mobile use of mobile computing 101 in these systems is exemplary only, and that these systems can be run with any mobile electronic device, or other device suitable electronic device. 1002 87] Another non-limiting use case for the technologies described in this document involves the use of a mobile computing device and screen consistent with the present disclosure in a vehicle, such as a car, train, plane, or other automobile. context, a web consistent with the present disclosure could be integrated with. the vehicle, and a mobile computing device can be configured to establish a paired connection with. screen, through a wired interface, wireless interface, or a combination of them, as described above. For example, the mobile computing device can be configured to establish a paired connection to the screen at least in part by fitting with a plug connector which is located on the vehicle and which is coupled to the screen, alternatively or additionally, the device Mobile computing can establish a paired connection to the web wirelessly. In such cases, useful applications, such as navigation applications, streaming audio applications, etc., can be run on the mobile computing device, with their respective media broadcasts launched to the screen. [002881 Another non-limiting use case for the technologies described in this document involves the use of a mobile computing device consistent with the present disclosure in a health care context. In this context, a mobile computing device may include memory that stores the user's medical records, or may have access to those records (which can be stored in a remote location). In any case, a user who wishes to transfer or grant access to his medical records can, via the mobile computing device, launch a display of his medical records. And other information to a non-integral web, such as a computing device to the doctor . Due to the sensitivity of the information involved, the display of medical records on the physician's computing device may be linked to the establishment of a root of trust with the physician's computing device. In any case, once the medical records display is launched, the doctor, or another user of the non-integral screen, can view and / or update the records through the screen. Updates can be saved to a copy of the records that are stored on the mobile computing device or to a remote location (for example, a remote server). Once the physician has finished viewing the records, the mobile computing device can transmit a termination signal, causing the non-integral display (i.e., the physician's computing device) to delete any copies of the user's medical records stored in non-integrated web (for example, an ATM), prfimivin-do - /. a-: users interact with them, for example, to carry out financial transactions, When a user finishes their action with the application / transaction, the oxspositivo mobile computing can transmit a cexmination signal to the screen, causing the screen to exclude data that may have been stored on it in connection with uu® application and / or user inputs, xeso can exclude highly secure financial transactions , was that no trace of the user's financial records or activity can be left on a screen. [áO29 .-. j Another non-limiting use case for the technologies described in this document involves the use of a mobile computing device to manage access to one or more services and / or shared resources. This use case can be particular interest, in which large numbers of individuals may wish to have access to a limited resource at the same time, such as a restroom, restaurant, vendor. and similar, In this context, the mobile computing devices described in this document can be used to register remotely for a service and shared resource. The record can be triggered by the mobile computing device in response to a gesture, one. emission of an input device, sensor data, etc. The registration may involve the transmission of a signal to a third party system (for example, a victor set) that manages a queue for the shared service / recurse, Mobile computing can then alert a user when it is their turn to use the service / feature, for example, in response to one or more signals from the third party system. Similarly, the mobile computing device can be used to direct a user to the shared service / resource location, tUci / D Another non-limiting use case for the technologies described in this document involves the use and and a mobile computing device in public or mass transit, such as: a bus, a train, an aircraft, and the like. In such cases, a mobile computing device consistent with the. present disclosure may be aware of one or more of a user's location, destination, and itinerary. With the above in mind, the mobile computing device can, in response to an input (eg, a gesture, sensor input, etc.), track the user's location in relation to the destination. Upon detecting that the user has arrived at. destination, the mobile computing device can alert the user. As an example, the mobile computing device can alert the user by launching video information that contains an alert for a non-integral web, such as the user's glasses, a watch worn by the user, or another non-integral screen. 10Qzíjj Another non-limiting use case for the technologies described in this document involves the use of a mobile computing device, with a kiosk. In these cases, the kiosk can be a screen, not integrated with which the mobile computing device can pair. This can be particularly useful in cases where a user is on vacation. In this case, the kiosk can be provided at a location of interest to a user (for example, a tourist attraction). The mobile computing device, in this case, may have a virtual tour application stored on it. By pairing with the kiosk, the mobile computing device can run the virtual tour application to launch its audio / visual broadcast to the kiosk. As can be appreciated, this can enable a user to receive and interact with a virtual tour of a tourist attraction through the kiosk and the mobile ooinputing device, similarly when the kiosk is at the airport, the device. Mobile computing may include an air travel management application. By pairing with the kiosk, the mobile computing device can run the air travel management application and launch its audio / visual broadcast to the kiosk. This can allow a user to obtain air travel services (e.g., boarding pass issuance, gate directions, flight departure reminders, notification of the user's estimated time of arrival at a gate, etc.) through the kiosk. [UU294 j Another non-limiting use case for the technologies described in this document involves the use of one. mobile computing device described in this document in a business context. In many cases employees want it. take personal computing and other equipment to your workplace, and use that electronic equipment for equipment in the performance of your work. This raises security concerns, par'ticu.larmen.te if an employee's work is of a sensitive or confidential nature, and his equipment is poorly protected against threats, such as malware. The mobile computing devices described in this document may have the capability to address all or one. portion of that concern using the equipment provided by the employee as a non-integral screen, i 1) 0295] More specifically, the mobile computing device can be configured to establish a paired connection with the equipment provided by the runcionan (for example, tables, monitors, etc., as generically described above, the mobile computing device can then run business applications and launch the audio / visual broadcast of them (and potentially other data) to the equipment to the employee. time, the mobile computing device can transmit a termination signal to the employee's equipment, where the termination signal is configured to cause the employee's equipment to delete data and other information received from the mobile computing device. the fact that business applications run on the comp device mobile operation and all or a portion of the information in connection with that execution is excluded from the employee's equipment, the security of business resources can be improved. 100236] In addition, in the business context, the mobile computing device can be equipped with sensors and other resources that enable communication and employee location services. In this regard, the mobile computing device can be equipped with a positioning sensor. global, telephony capability, and / or messaging services, which can be used to iocanzar and / or contact an employee. In a similar way, moving devices can be used. s p o d in s e r c on f 1. g u r a · s p a r a 1 a r aistristr)) and other information to other employees, for example, in connection with a meeting, presentation, or the like. Snemplos [00297j The following examples belong to the traditional modalities. The following examples of the present disclosure may comprise matter as a system, a device, a method, a computer-readable storage medium that stores instructions that, when executed, make them one. m.á.machine perform acts with nase in the method, and / or means to perform acts based on the method, as provided below, (. uúzáá · .Example .1: According to this example, a mobile computing device is provided, which includes a processor and a memory, and the memory includes at least one. module that includes instructions readable by compuLàdui that. when performed by the processor, cause the mobile computing device to perform the following operations which include: establishing a paired connection with at least one target screen per slot configured to match a corresponding connector on the target screen. [üuiQáj Example 6; This example includes either Locios or the resources in Example 1, on which the mobile computing device. includes a head media interface, where the paired connection is established using the media link ca.bea.da and the mobile computing device is configured to transmit at least video frames to the target screen through the paired connection, {00304] Example 7; This example includes any or all of the features in example 6, where the wired media interface includes at least one of the high definition murmur interface, a digital video interface, a universal serial bus interface, and combinations thereof . {0030b] Example δ: This example includes anyone. or touch the resources of example 1, and additionally include at least one sensor. [00306] Example 3: This example includes any or all of the features in example 8, in. than the at least one. sensor 'includes skin minus one of an optical sensor, location sensor, orientation sensor, t.ati.1 sensor, motion sensor, biametric sensor, and combinations thereof. [00307] Example 10: This example includes any or all of the features in example 0, where ο ραίο minus one sensor includes at least two of the optical sensor, location sensor, orientation sensor, cattile sensor, motion sensor, and biometric sensor. 100308] Example 11; This example includes any or all of the features in example 1 <and additionally includes a power source. LtOsttj Example 12; This example includes anyone. or. all the resources of example 11, in which the power source includes a battery. [bu310j Example 13; This example includes any or all of the features in Example 12, where the battery is rechargeable by at least one of AC power wired, DC power wired, a wireless charging technique and combinations thereof. [001 iij Example 14 - This example includes any or all of the features of example 13, in which the battery is rechargeable by a wireless charging technique, the mobile computing device includes adding a receiver to receive electromagnetic radiation and convert that. electromagnetic radiation in electrical power. iOclllj Example 15: This example includes either or. all features of example 1, and additionally includes at least one input device, [Ü0313J Example 16; This example includes any or all of the features in example 13, where the at least one input device includes at least one of a button, a touch panel, a trackball, a trackpad., A teciadc, a mouse, and a motion sensor. [00314] Example 17: This example includes any or all of the features in example 1, which includes a communication interface without. wire, wherein the at least one module comprises an input device module, the input device module including computer-readable instructions that, when executed by the processor, cause the mobile computing device to pair seamlessly at least one input device via the wireless communication interface. [uOdi5j Example 18: This example includes any or all of the features in example 1, where the mobile computing device includes both a wireless communication interface and a c ahead a communication interface. i00316J Example 19: This example includes any or all of the features of example 1, said pole minus one additionally includes a device pairing module that includes computer-readable pairing instructions that, when executed by the processor, make cause the computing device to move to establish the paired connection at least by the pairing performance operations that include: having the processor determine an identity of the target screen. LüOUiv] Example 20: This example includes any or all of the features of example 19, in which the pairing instructions, when executed by the processor, match the processor's determination, the identity of the target web at least in part by identifying itself an internet protocol address of the target screen. 100318] Example 21- This example includes any or all of the features in example 20, in which the pairing operations additionally include: making ο aispcs.itI mobile computing transmit a request message to the target screen, the request message being configured to cause the target screen to transmit a slow motion to the mobile computing device; and having the mobile computing device determine the identity of the target screen from at least the identifier. tí / Oo iãj Examples zz: This example includes anyone. or all the resources to example 20, where the computing device moved xnc.i.ui a chaotic communication interface, and the pairing instructions, when executed by the processor, cause the mobile computing device to determine the identity of the screen target at least in part using the wired communication interface. [00320] Example 23: This example includes any or all of the features in example 20, in which the mobile computing device includes an uncle-less communication interface that has the capability of at least short-range communication, and pairing instructions , when executed by the processor, allow the mobile computing device to determine the identity of the target screen at least in part with the use of short-range communication. (oto21.) Example 24: This example includes either or. all the features of example 23, in which the short-range communication includes at least one among near-field communication and bluetooth communication. identity of the target screen for the computing device C0Q329] Example 32: This example includes any or all of the features in example 31, where the communications channel is bi-annual. (0033ÔJ Example 33: This example includes any or all of the resources in example 31, where the communications channel is one-way. I uíj3 31 j Example 34: This example includes any or all of the features in example 31, in which the pairing instructions, when executed by the processor, cause the mobile computing device to run. Start the Q.mpa session. .r <altiam.orito θ o channel <3.6 communications using a wireless communication protocol. establish. the communications channel using minus one. first socket of the mobile computing device1, [00335] Example 38: This example includes anyone. or too many of the features of example 37, where the first socket and a continus transmission protocol socket. [00336] Example 39: This example includes anyone. or all the resources in example 36, in which the memory additionally includes one. support channel module that includes computer-readable support channel instructions, in which support a and channel instructions, when executed pom proçessaoor, match the disnosí had to · 180/274 compu.ea · mobile. ·. es tâfsJ. start csnsl cie communications support, at least in part, by negotiating a mutually supported socket with the target screen. [00337] Example 40: This example includes any or all of the features in example 19, where pairing operations additionally include; cause the mobile computing device to handle a termination event; keep the connection paired when the termination event is not detected; o terminate the empareihaoa connection in response to the detection of the termination event. pairing additionally include making the processor place the computing device in a public domain. tuOilbJ Example 4.2: This example includes any or all of the features in example 19, where pairing operations additionally include making the mobile computing device broadcast a public connection request. [00340] Example 43: This example includes any or all of the features in example 42, where the mobile computing device is configured to start broadcasting the public connection request in response to at least one entry. [003411 Example 44: This example includes any or all of the features in example 43, where at least one entry includes at least one of a button press and a basket. ί ΰÜ <::: ζ j Example 4..b: This example includes anyone or any tecuxsus Qut example 42. in which the operations of the empireharnento include in addition making the mobile computing device monitor for the reception of a connection key from the target screen. 100343] Example 46; This example includes any or all of the features of example 45, where mnparexnamon.to operations additionally include making sure that, in response to receiving the connection key, the mobile computing device validates the authenticity of the connection crave and terminates pairing operations if validation of the authenticity of the connection key fails. cOsotlj hxempxo 47: This example includes any or all of the features o Example 19, in which the computing device moves, includes one. chained communication interface, in which the pairing operations additionally include making the computing device move this. start the paired connection through the wired communication interface. Itü.Vibj Example 48: This example includes any or all of the features in example 19, where the mobile computing device includes a riverless communication interface, where pairing operations additionally include making the computing device move establish the paired connection via the wireless communication interface. LÜtõlbj Example 45: This example includes any or all of the features in example 1, where the paired connection and a point-to-point connection between the mobile computing device and the target screen. video includes frames from a frame temporary storage of at least one of the running application ηλ ..> d..c topos iivo or movi computation and the operating system (OS) running on the movi computing device, at least one I modulate a frame launcher (FT) module that includes computer-readable FT instructions, in which the FT instructions, when executed by the processor, cause the mobile computing device to perform the following operations that include: capturing the frames; encapsulate the frames in packages; and transmitting the packets to the target web through the. paired connection. [0'0348] Example 51: This example includes any or all of the features of example 50, in which the FT instructions, when executed by the processor, additionally do. that the mobile computing device compresses the frames before encapsulating the frames in the packages, [00349j Example bz: This example includes any or all of the features of example 51, in which the FT instructions, when executed by the processor, additionally take with the mobile computing device to compress the frames with the use of at least one among interframe compression, compression: infra-frame, color space compression, and data reduction. additionally a hardware compression mechanism (')' '. u ο pa -t- α ο: no ac · ... a . s s o s s. (00351] Example 54; This example includes any or all of the features of example 50, in which the RF instructions, when executed by the processor, additionally cause the mobile computing device to: monitor a termination event; continue to transmitting the packets to the target uo if the termination event was not detected, and terminating the transmission of the packets to the target screen in response to the detection of the termination event. [00352] Example 55; This example includes any or all of the features of example 51, in which the FT instructions, when executed by the processor, additionally, are used with. that the mobile computing device: monitor at least one monitored performance metric; and dynamically adjust at least one of a level and type of compression applied to frames at least in part on at least one monitored performance metric. [003551 Example 56: This example includes any or all of the features in example 55, in which at least one metric, of monitored performance includes at least one among processor performance, load, processor, screen performance, consumption bandwidth of the paired connection, power consumption of the mobile computing device, power consumption of the target screen, and battery level of the mobile computing Gisposttivo. [00354] Example 57: This example includes anyone. or all of the features in example 55, where the instructions when executed by the processor additionally cause the computing device to move: write down each package among the packages with information specifying at least one among the type and level of compression applied to the squares. [uoizS] Example ot: This example includes any or all of the features, from example 55, in which the FT instructions, when executed by the processor, additionally do with the mobile computing device: compare the performance metrics monitored in in relation to a predetermined performance threshold; dynamically adjust or man has at least one of a level and type of compression applied to frames based, at least in part, on. whether the monitored performance metric meets or exceeds the predetermined performance threshold. [00356] Example 5.9: This example includes any or all of the features in example 55, where the monitored performance metric includes the use of bandwidth or the paired connection and a load imposed on the processor of the mobile computing device. ., and the FM instructions, when executed by the processor, deferred, cause the computing device to move: dynamically adjust at least one of the type and level of compression applied to the quoros to achieve a desired balance between the imposed load on the processor of the mobile computing device and the use of the bandwidth of the. paired connection. [0035 / j Example 60: This example includes any or all of the resources in example 1, in which the video information includes frames from a temporary storage. u at least one of the application running on a mobile computing device and operating system (CS; running on the mobile computing device, and at least one module includes a flow launcher (ST) module that includes computer-readable ST instructions that, when executed by the processor, make the mobile computing device perform the following operations which include: capturing the frames; converting the frames to a video; and transmitting a signal that contains the video for the target screen via the paired connection consistent with a predetermined video transmission protocol. [00358] Example 61: This example includes any or all of the features of example 60, in which the ST instructions, when executed by the processor, additionally allow the mobile computing device to convert the frames into video with the use of a predetermined video conversion protocol. [00359] Example 62: This example includes any or all of the features in example 60, where the predetermined video transmission protocol is a continuous video transmission protocol. L00360] Example 63- This example includes any or all of the features in example 62, where the video streaming protocol is a real-time streaming protocol (RTSP). [00361j Example 64: This example includes any or all of the features of example 60, in which the ST instructions, when executed by the processor, additionally touch with which the moving device compacts u viaeü before transmitting the signal pana a target screen, IC03621 Example 65; This example includes any ura. or all of the features in example 64, which include .. <i: ... o, ia ± Γ; · Α ·.: ΠL, .and a hardware activation mechanism configured to compress the video. [Gcdbrj Example 6b: This example includes any -one or the features of example 60, in which the instructions of hi, quaudt.í executed by the processor, additionally cause the mobile computing device: muxiltoie usi evento oe terriinaçao, · continues to transmit the siíktl that contains the video to the screen — a.lvo if the t'rifuiiaçao hâu roí 'detection event and end the transmission of the fo.x.no.1 that contains the view to the target screen in response to the detection of the termination event. [0a64 i nxempio b /: This example includes any other or all the resources of example 1, in which at least one moauio includes a transmission module of the video itiuilicanai iMvij that includes instructions from the computer-readable. when executed by the processor, they cause the mobile computing device to perform the following operations, which include: monitoring a display performance characteristic on the target screen; comparing the performance characteristic of eziping against a predetermined performance index to determine whether the target's performance is satisfactory; when the performance of the target screen is satisfactory, continue to transmit the a and vweo information to the target screen without modification; when the performance of the target screen is unsatisfactory, establish a complementary connection with the target screen using an additional mode and additional anxiety, the ac.icion.al transmission mode is different from a first meandering mode. which the paired connection is established; and transmit the video information to the target web using the paired connection and the complementary connection. iüüJòõ] Example 68; This example includes any one or all of the features in example 67, where the display performance feature includes at least one of the frames per second of the video information that are required by the web. ~ A.lvo, several frames of the information video that are ignored by the target screen, and a time between frame updates of the target screen. L80366J Example 69: This example includes, any one or. all features of example 67, where the first transmission mode and a short-range communication path, and the additional transmission mode is a long-range communication mode. [u0a6zj Example 7 0: This example includes any or all of the resources Q. example 67 ,. wherein the first transmission mode includes a wireless connection between the mobile computing device and the target screen, and the additional transmission mode includes a wired connection between the mobile computing device and the target screen. [00368J Example 71; This example includes any nm or all of the features in example 67, where the first transmission mode includes, a first type of wireless communication, and the second transmission mode includes a second type of wireless communication that is different from the first type without communication. thread.. [uOrtS] Example 72; This example includes any or all of the features in example 1, one that the video information has a first orientation and the mobile computing device has a second orientation, and the at least one module includes an orientation control (OC) module which includes computer-readable OC instructions that, when executed by the processor, allow the mobile computing device to manage the first orientation over the second orientation ,. i.0037u] Example 73: This example includes either or t-vdc-s the features of example 72, in which the od instructions, when executed by the processor, cause the computing device to move to manage the first orientation, at least at least in part, by making the operating system report to the application that the second orientation is fixed »[uuo / ij Example 74: This example includes any or all of the features of example 72, where the oe video information is sound produced at least in part by the application, and the OC instructions, when executed by the processor, additionally cause the application to require the video information to be, consistent with the second orientation, [00372] Example 75: This example includes either or all of the features of example 72, where video information is produced at least in part by li) U3 3j Example 76: This example includes any u® or all the features in example 75, g® a and the mansacem includes a header that defines the change in one. or more parameters expected from the a.p li ive's display emission. additionally configured to make the save screen end an existing window in which the video information is displayed. and with a new window to display the video information consistent with the changes in one or more parameters expected from the emission of • -pízuXO.l Ç o. O O O càjpd .. d, O i. VO, [00377] Example 80: This example includes any or all of the features in example 75, where the oc instructions, when executed by the processor, additionally cause the mobile computing device to monitor the receipt of a message. confirmation from the target fool who confirms the change in one or more expected parameters, i0t3 / 8] Example 81: This example includes any one. or all of the features in example 1, where at least one module includes a download module (OL) that includes computer-readable 0L instructions cue, when executed by the processor, cause the mobile computing device to perform the following operations which include: in response to receipt of .li.if uj. apple t, mi as. d .. ear a s irií or m.a with cod .:.1 .changes to the target screen for decoding. [00379] Example 82: This example includes either or t ~ -ιό · .. Θ 1. Or. ΛΛ-Χ bOS O '.) Grandma.í. ‘. Va.i O-i · O O .i. . θΠΙ 0'110 ip 'V <' · V ΓΡγ-Λ * '}>' · '·· <1 [encoded includes encoded video. pcii & ρι uduz λχ · unis. G.C5 to teinpox'BX '1C) d.fò OLlckClX'D v which includes computer-readable management instructions, monitoring an input device emission, detected correlated to an input device emission in the base data when the predetermined period of time has not expired; and end monitoring of the detected input device emission when the predetermined period of time has expired. lOsãBfej Example ti: This example includes any or all of the resources- example 86. where the first bank of dacos additionally includes at least one contextual modifier that modifies at least one action associated with at least one input device issue in the first data sampling, and the management module instructions, when executed by the: processor, postponed, cause the computing device to move: determine if at least one contextual modifier is present when one. o.e input device emission detected corresponds to or correlates to an input device emission in the first database; and perform an action consistent with issuing the input device to the first database and the contextual modifier, [0u38 / j Example 90: This example includes, either or. all the resources in example 89, where the contextual modifier includes at least one of a status of an application running on the mobile computing device, a magnitude of the emitted input device issuance, an input action reported by manos an input device and combinations thereof. the mobile computing user insert a digital pointer into the frame temporary storage in a position based, at least partially, on an output Q and an input device; where the information in the video includes the digital pointer. lütuOuJ Example 99: This example includes any or all. atnbauo-s to example 98, and that the instructions üioaüio a and iú, when executed by the processor, cause the mobile computing device to carry out the following operations that include: changing the position of the digital pointer at least partially, with based on a change detected at the input device output, i.üOuã / j Example 1UU: This example includes any or all of the attributes of example 99, in which the instructions ae moouxo o and 1D, when executed by the processor, additionally touch with which computing device it moves. ·. perform the following operations that include: converting the output or input device to two-dimensional screen surface coordinates: insert the digital pointer into the temporary storage of quae.ro in a position based, at least partially, on the screen surface coordinates two-dimensional; and change the position of the digital pointer based, at least partially. Once, in a detected change in the two-dimensional screen surface coordinates, [uü89bj Example 101: This example includes any or codes us at. · '. i.or tos cio exempro yy, where the least link: an input device includes at least one of a mouse, keyboard, trackball, and trackpad or movement. [ut399j Example 10 102: This example includes any or all of the attributes of example 98, in which the instructions that the ID, when executed by the processor, additionally cause the mobile computing device to perform the following operations that include: monitoring the output from the input device to a detected input device event; and report the event of d.j. .sposs i. u, l v o de encraoa detectaoo for at least one of the application and the operating system, so as to the ratio with which the application, the operating system or one. combination of them perform an action consistent with the detected input device event. [00400] Example 103: This example includes any or all attributes of example 102, in which the application It includes at least one social media application, [004011 Example 104: This example includes any or all attributes o. Example 102, where the event of the device to and from detection includes at least one of the movement of at least one device of the The... . <u.a, a ç.; í. ;;. the pei o ’Seims is an input device, a drag with at least the input device and one. button press on at least one. input device. [00c02] Example 105; This example includes any or Ledos attributes of example 98, in which the device is connected to the mobile computing device via a wired connection, wireless connection or a combination thereof, c ui 11 .. r u .1 e cie a.c es s o The. ur co U.ibpOrfltiVO Q® COJílpU.ta.ÇêiQ movi executed by the processor, they induce the computing device: mobile to declare control over resources. 100423j Example 126: This example includes any or all atrroutes or example 125, where the one or more features include at least one of a supplementary power supply, an input device, a sensor, and a cellular radio. Example 127: This example includes any or all of the attributes in example 12b, where the one or more features include at least one sensor selected from the group consisting of a camera, a giooai positioning sensor, a biometric digitalizer. 100425] Example 128: This example includes any or all of the attributes of example 1, in which the computer-readable instructions of at least one module, when executed by the processor, induce the computing device to move to perform the following operations which include: trying establish a wired or wireless connection to a long distance area; when a straight connection to the long distance network cannot be reached, send a data signal to one or more elements of a mesh network, and the daoos signal is configured to allow u® or more elements to route the signal, of data to the long distance network, both by air and by routing the signal, from aaaos through at least one additional element of the long distance network. [00423j Example 129: This example includes any or too.cs the attributes of example 12 8, in which the elements of a mesh network include at least one of a television. i.vG-si / j βΛίώφιο à. 1 ij: This example includes any or all of the attributes of example 128, in which the mobile and mobile device is connected to receive data signals from the wide area network directly or through one or more of the elements of the network. network a mesh. legi.vexs per computer of at least one module, when executed by the processor, additionally cause the mobile computing device to establish a communications device with at least one elements; The mesh network. [00429] Example 132: This example includes any or all of the attributes of example 128, in which at least one module includes a network management (NM) module that includes computer-readable NM instructions that, when executed by the processor, cause the mobile computing device to perform the following operations that include: monitoring at least one. among some guduticaae of data sent by the computing device I moved through the mesh network and a quantity of data received by the disoosit. ΐ vo dw mobile computing via mesh network; and correlate the amount of data sent by the mobile computing device through the mesh network, the amount of data received by the mobile computing device, or a combination of them: to a reward. [ücv3 0] Example lo 3; This example includes any or all of the attributes of example 1, additionally including a plurality of wireless communication interfaces that support a plurality of communication modes, wherein said at least one xiiclux module is a communication management module (CM ) that includes computer-readable CM instructions that, when executed by the processor, cause the device and computer to move, perform the following operations that include: in response to receiving a request to transmit a data signal, cause that the mobile computing device analyzes the request and assigns a level of urgency to the data signal; and select one or more of the modes of communication based, at least partially, on the level of urgency. (u0431j Example 134: This example includes any or all of the attributes of example 133, where the plural ida.de ee modes of communication includes an inexpensive Q-rsd mode of communication and a mode of communication in which: inexpensive., and the CM instructions, when executed by the processor, induce the Mobile Computing Device to perform the following Operations which include: selecting the communication mode i ele, ui v «.went and ui spend! os o or the relatively inexpensive mode of communication for the transmission of the sma. ·. o and data based, at least partially, on a comparison of the level of urgency an urgency threshold pre-terminated. movi computation perform the following operations that xâc.i.uem: in response to. a request in order to send a signal and data through an application running on the mobile computing device, select one or more among the piurarioace of communication modes for transmitting the data signal with. based, at least partially, on a comparison of application bandwidth requirements and the available bandwidth for the mobile computing device through one or more of the plurality of communication modes. (OütaSj Example 138: This example includes any or i .. o do t. o the ati tudes of example 13 /, in which the CM instructions that, when executed by the processor, also cause the mobile computing device to perform the following operations that include · selecting a or more between the communication modes for the transmission of the data signal based, at least partially, on the maintenance of a predetermined quality of service. [00436] Example 139: This example includes any or all of the arrioutos of example 1, where the least one module includes a cache management module (CM) that includes! Ui computer-readable CM instructions' which, when executed by the processor, cause the mobile computing device to perform the following operations which include: transmitting a data signal by weight minus a server, the data signal being included. contextual information and is configured to cause the server to determine at least one of a type and nature of data to push, pairing actions, when executed, do aàj.c-.i.Qi'id.i.moru „and make the screen perform the following operations that include: monitoring whether a pairing request message is received from Qibposíiivo ae mobile computing; and, in response to the pairing request message, transmitting the identitica.dor message to the moving computing device and establishing the paired connection. with the mobile computing device. [QQ440] Example 143: This example includes any or all of the attributes of example 140, where the screen is additionally configured to receive packets from the mobile computing device over the paired connection, the packets including encoded video information. , 00a4i] Example 144 :. This example includes any or all of the attributes of example 14 0, additionally including a video decoding module (VD> stored in memory, the VD module includes computer-readable VD instructions that, when executed by the processor, cause the screen to perform the following operations, which include: in response to receiving the packets, decoding the packets to contain the video information contained therein. [00442] Example 145: This example includes any or all of the attributes of example 140, which includes an input device monitoring module (CIDM) usually stored in memory, the T.D.M. includes computer-readable IDM instructions that, when executed by the processor, allow the screen to perform the following operations that include; in response to receiving a signal, output from an input device, monitor the output signal to one. input device event; and in response to detecting one. input device event, report the input device event to the mobile computing device through the paired connection. Hhvm.r Example 146; This example includes any or all Oi »àuiíüutos from the example isb, in. than the .s> aid »signal and lecsbiao across the screen via a wired connection. with the input device, a connection without x. of the input device or a combination thereof. lOühtój Example 147: This example includes any or all of the attributes of example 145, in which the input device event includes at least one of a mouse click, a mouse click, a Loque entry, a use option the finger and a movement operation. uças5j Example 1.48: This example includes any or all of the attributes in example 145, where the IDM instructions. when executed by the processor, they additionally cause the screen to report the input device event to the mobile computing device, at least partially, by transmitting a lexator signal containing an input device report to the mobile computing device, where the input device report identifies the input device event. support channel module. (: BC) stored in memory, and the BC module includes computer-tactile BC instructions that, when executed by the processor, cause the screen to perform the following operations that include: establishing a channel wireless support between the wireless communication interface and the mobile computing device; transmitting the signal from the rapporteur10 to the computing device moved through the wireless support channel. [00450j Example 153: This example includes any or. all attributes of example 140, in which the screen is selected from the group consisting of a dumb screen and a smart screen. í. OOscj. j 1 'Ro 154: This example includes any or all of the attributes of example 153, in which the screen is a dumb screen and selected from the group consisting of a television, a computer monitor, a display, a dock and a projector. [Oueçij Example 15b: This example includes any or all of the attributes of example 153, where a. screen is a smart screen and is selected from the group consisting of a laptop computer display, a display attached to a desktop computer, an electronic reader display, a desktop personal computer display, a personal data assistant display, a smart phone display and a. cell phone display. I 5 0453] Example 156: This example includes any or all of the attributes of example 153, where the screen is part of at least one of one. automobile, an airplane. a bicycle, a motorcycle, a snowmobile, a. train, a medical ai, a heads-up display, a control interface, an electronic shopping portal, a kiosk, a restaurant menu, pinnacles, glasses, a food preparation tool, audio equipment, a a simple registration system, a financial transaction system, a badge and clothing. [00414] Example 157: This example includes any or all of the attributes of example 140, in which the catalyzed communication interface includes a media interface, although the media interface includes at least one of a digital video interface (DVI) , a high definition multimedia interface (HDMI) and a universal serial bus (interface). tOtcbaj Example Ibt: This example includes any or all of the attributes of example 140, where the wired communication interface includes a media interface, the media interface including a plug-in connector configured to attach to a connector corresponding to the device mobile computing. [00456] Example 159: This example includes any or all of the attributes of example 140, which also includes a screen body configured to physically attach to the mobile computing device ,. [004 57] Example .160: This example includes any or all of the attributes of example 159, in which the wired communication interface includes a media interface, the media interface including at least one plug connector, the at least one plug connector is configured to mate with a corresponding connector on the mobile computing device when the screen body and the mobile computing device are physically coupled. t u * .. >> 40 j .example .161: This example includes any or all of those that came from example 159, in which the relation body .Liciui a xeentráncia to engage with .mans; ira receptive! to the mobile computing device., i. ouitoi] nxempio lb2: This example includes any ou ^ ’.. jO.us uí> a ui. ± .butes an example xbO, in which the body <3e of the screen includes a recess, to engage in an acceptable way to the mobile computing device, and the plug connector is located inside the recess. [0u460] Example 163: This example includes any or all of the atrocious ones of example 140, which also includes a wireless communication interface, in which the o and pushing, when executed with the processing weight, additionally cause the . screen establish the paired connection at least paroially, with the wireless communication interface. [00461] Example 164: This example includes any or all of the attributes of example 163, in which the uncle's communication interface is configured to communicate using a short-range communication. [0-U462] Example 165: This example includes any or all of the attributes of example 164, where the wireless communication interface is configured to communicate using near field communication. Transmission control (TCP) pzotocozo, a 0.0 universal catatagram protocol (UDP) and an internet protocol. [00473] Example .176: This example includes any or all of the attributes of example 171, which additionally includes a support channel (BC) module stored in memory, and the BC module includes computer-readable BC instructions which, when used by the processor, do. with. that the screen performs the following operations that include; establish a wireless support channel between the wireless communication interface and. the mobile computing device [00414] Example 177; This example includes any or all of the attributes of example 17 6, in which the BC instructions, when executed by the processor, add a zonal menu and the screen establishes the support channel at least partially, negotiating with the mobile computing a mutually supported socket for this in the support channel. Ϊ. 0-047.5] Example 178: This example includes qualouer or all the attributes of example 176, where the mutually supported socket is a real-time streaming protocol (RTSP) socket [004761 Example 179: This example includes any or all the attributes of example 140 ', in which the pairing instructions, when executed by the processor, postpone canvas with. the screen performs the following operations that include: monitoring whether a public pairing request is received from the d i. .L, ρ o o .i l.,. V- o do c oiíip u css to .Uiove.t., Being one a s-o.;. public pairing method includes the pairing request message in response to receiving the request and pairing the public, ignore other pairing request messages and public pairing requests for a predetermined period of time. itO4 /. 'J Example 18 0: This example includes any or all of the attributes of example 179, in which the pairing instructions, when executed by the processor, additionally cause the screen to perform the following operations that include: in response to rsceocão of the public pairing request, monitor whether a connection key is received. IOQ478J Example 181: This example includes any of the »attributes of example 180 0, in which the pairing instructions, when executed by the processor, are additive. cr ona. Once the screen performs the following operations, which include: finishing pairing with the mobile device when the connection key is not received within one. predetermined period of time; and, in response to receiving the center connection key for a predetermined period, transmitting the connection key to the mobile computing device. [0U4 / 9j Example 182: This example includes any or all of the attributes of example 140, where the paired connection is a point connection a. dot between the screen and the mobile computing device. [0Q480J Example 183: This example includes any or all of the attributes of example 17 9, and additionally includes a connection key stored in the system, in which the pairing instructions, when executed by the processor, additionally do with q. ·· .: ··: cs. i_eia perform the following operations which include: in response to receiving the psbnco pairing request, transmit · the connection key to the mobile computing device .. , i.üui81 j Example 1 o 18 · <: This example 1 o 1 u.c 1 ui wed. 1 ouer or uOaOb c> and attributes to example 140, in which the pairing instructions, when executed by the processor, additionally cause the screen to perform the following operations that include validating a user's identity of the mobile computing device before establishing the paired connection. [00482] Example 185: This example includes any or all of the attributes of example 140, in. that the instructions of δραΐamamento, when executed by the processor, additionally cause the screen to carry out the following uptóraçoes that include: initiate the pairing with the mobile computing device 'by transmitting a pairing request message to the mobile computing device. Ltusbij Example 186: This example includes any or all of the attributes of example 185, including ω.ό.1 cionaIm.wUA.e a sensor and an Oo communication interface without no, em. that the pairing instructions, when performed by the processor, postpones the display to perform the following operations, which include: monitoring an output of at least one. between the sensor and the wireless communication interface in order to detect the presence of one. mobile computing device established within a predetermined period of time; and continue to establish paired connections with a mobile computing device when a trusted root is established within a predetermined period of time. mobile computing [οΟνΙζ] Example ia8; This example includes any or all or attributes of example 19 5 .. in which the frames are encrypted frames, and the VD instructions, when executed by the processor, cause the screen to perform the following operations that include: decrypting the encrypted frames in order to get the frames. tOOcOtj Example 199: This example includes any or all of the attributes of example 140, in which: o and video information includes a video produced from the four captures of a temporary frame storage of at least one of an application and an operating system run on the moving device, the video is encoded in a video format; and the memory has a video decoding module (VD) stored therein, where the DV module includes computer-readable DV instructions that, when executed by the processor, already cause the screen to perform the following operations that include : in response to receiving the media signal, decode the vices and display the video information on the display. [0949 / j Example 200: This example includes any or all of the attributes of example 199, in which the video is streamed, and the DV instructions, when executed by the processor, cause the screen to perform the following operations that include : decompress the video before Ce displays the video information on the display. [00198] Example 201: This example includes any or all the attributes of example 199, where a. screen and .úír / z / 4 i. Gυ already. j. j iixemp.j.o zx4: .this example includes any or all of the attributes of example 213, further including: one or more resources to supplement a capacity of said mobile computing device through the successful establishment of said paired connection; I attach at least one module stored in memory, and at least one module includes computer-readable instructions that, when executed by ρζ uçe, osauo.z, cause the screen to perform the following operations, which include: in response to the establishment of the paired connection, allow the mobile computing device to declare control over one or more resources. Iu0ol2j Example 215: This example includes any or all of the attributes of example 140, and includes at least one module stored in memory, where the at least one module includes computer-readable instructions that, when executed by the p.í.ocessadt.n., reason for the screen to carry out the following operations that include: deleting at least a portion of the video information and other information received through the. paired connection from memory in response to at least one of: receiving a termination signal at pa.rt.xr from the mobile computing device; the span of a period of time pi edet eiíutddç ·; detecting a termination event that terminates the paired connection; and detecting communication latency that exceeds a predetermined latency threshold. 100513] Example 216: This example includes any or all of the attributes in example 140, and includes v X. or. ··. ·.:. χ, Πβη tmn asiDieni.s protection and me.nns a feature that includes computer-readable instructions stored in memory, in which the screen is configured to store at least one center of vioew information, applications and others information received through the paired connection in the protected environment; computer-readable instructions, when executed by the processor, cause the screen to perform the following operations, which include: erasing at least one potion for video immormations and other information received through the paired connection from the protected environment in response to at one less: receiving a termination signal from the mobile computing device; the expiration of a predetermined period of time; the detection of a termination event that ends at. paired connection; and detecting communication latency that exceeds one. predetermined latency threshold. L60514] Example 217: This example includes any or Ledos as out of example 14 0, including an encryption module stored in memory, where the encryption module includes computer-readable encryption instructions that, when executed by the processor, cause the screen to perform the following operations that include: encrypting data to and from video to produce encrypted video data; and store the video data already in memory until the video data is due. be displayed in the display; and when the video data is to be displayed on the display screen, de-encrypt the encrypted video data and display the video data on the display. t v 1.1. .3] zixenip.i.w 2 r ί: r..se example mclni whatsoever or all the attrioutos to example 217, in. that the viiptogiafia instructions, when executed by the processor, additionally allow the screen to perform the following additional operations which include: after the video data is displayed on the display, it re-encrypts the video data in order to produce data from video encryptions and store video data encrypted in memory. [uuixts] Ez.emp.iu z.1.9: According to this example, a method is provided, the method includes, with a mobile computing device: transmitting a video signal that includes at least less video information generated by the method. u ρθχο minus an oenore an application that runs on the mobile computing device and an opuracionax system that runs on the computing device moves to a target screen through a paired connection between the mobile computing device and the target screen; where: the ethereal connection is established through at least one of a wireless communication interface and a wired interface; the mobile computing device lacks an integral display; the target screen is not integral to the mobile computing device; and the video signal is configured to make the target screen display the video information. [Oui.x .. · j E.xumple 2ζυ: if your example includes any or all the attributes of example 219, where the target screen is at least one of a dumb screen, and a smart screen .. i.0u5i.8j Example 221: This example includes any or all of the attributes of example 219, where the mobile computing device is one. among a cell phone, eietromco dean, glasses, move1 game console, netbook computer, notebook computer, internet device, personal digital assistant, portable media player, media recorder, laptop, smart phone, personal computer tablet type, ultra-mobile personal computer and a wearable computing device, [00519j Example 222: This example includes any or all of the benefits of example x. 19, in which a. Paired and established connection, at least partially, fitting the mobile computing device to the target screen. LGvoxUj Example 22 o: This example includes any or all of the examples in example 222, in which the mobile computing device includes a first plug-in connector and the web-a.Lvo includes a second plug-in connector, and the plug-in includes matching the first plug connector with the second plug connector, LOuui.í. J Example 224: This example includes any or all of the attributes of example 223, in which the second plug-in connector is within a recess in a screen body, the recess being configured to engage qe responsive to the mobile computing device. iuti.z. · Axeropio zzb ;, this example includes any or all of the attributes of example 219, where the .movei computing device includes a wired media interface, and the method additionally includes establishing the paired connection at least partially with. the wired media interface. [Example Example 226; This example includes any or all of the attributes of example 219, where the display information includes frames from a frame temporary storage of at least one of the applications that run on the mobile device and the operating system that runs on the device. of mobile computing, and the transfer of video information includes: capturing frames with the mobile computing device; encapsulate the frames in packets - and transmit the signal, video, with the video signal containing the packets; in which the video signal is configured to enable the. screen — target- process the packages and get the video information. [uÜ52c] Example 227: This example includes any or all of the attributes of example 226, and it optionally includes compressing the frames with the mobile computing device, before encapsulating the frames in the packages. lUuizoj hxempic 2z8: This example includes any or all of the features of example 226, where the mobile computing device includes a .5 D ./ · 4 hardware compression engine, in which snapshots are performed specify at least one of the type and level of compression applied to the frames. ítOcluj Example 233: This example includes any or all of the attributes of example 230 <and includes aoicionaimenté, with the mobile computing device: display the monitored performance metric to a predetermined performance threshold; dynamically adjust the pexü menus by one level and one type of compression applied to the frame based, at least partially, on whether the monitored performance metric meets or exceeds the predetermined performance threshold. j axemp.io z34: this example includes any or ... oóo : , ..> »to ll j. or as per example 2 30, -in which the monitored performance metric includes the use of the bandwidth of the paired connection and a load imposed on a processor of the mobile computing device, and the method additionally includes, with the mobile computing device : dynamically adjust at least one of a type and one. level of compression applied to qucj.d. : .os in order to achieve a desired balance between the load imposed on the processor of the mobile coType device and the bandwidth usage of the paired connection. Mtírtpxt z3u: This example includes any or all of the aurmutos of example 219, where the video information includes frames from a temporary storage Qe quad Qe monos uis among the application that runs on the mobile computing device and the op-ís system .:. au.x.ona.;. which runs on the computing device I moved, and the transmission of video information includes: uapuarar our frames with the ifiuvex computing device; convert pictures into video; and transmitting the video sreax consistent with a predetermined video transmission protocol f where the me video signal contains the video. Q: j Example 13 b t This example includes any or all of the attributes in example 235, in which the conversion of the frames into video is performed by the computation device Síovei using cie one. predetermined video conversion protocol. iOua.54] Example 237: This example includes any or all of the attributes of example 235, in which the predetermined video transmission protocol and a continuous video transmission protocol. [00535] Example 238: This example includes any or all attributes of example 237, in which the tiansiaibbao protocol continues. cie video is a real-time streaming protocol (RTSP). [00536] Example 239: This example includes any or all of the examples in example 235, which include viO.i '„u <., T: .ajmtííi and compressing the video with the mobile computing device before transmitting the signal of video. LOuti / j Example 240: This example includes any or all »The abbots of example 239, in which the moving device included one. haawdie compression engine and the mciui metetoao additionally.ee perform compression with the hardware compression engine. [00133J Example 241: This example includes any or all of the attributes of example 235, and includes õAXreioUd.cmente, with the level of computational level: in response to the detection of a termination event, terminate the transmission of the video signal with a mobile computing device. [00539] Example 242: This example includes any or all of the attributes of example 219, which includes aaicxonaemento, with q computing device: monitor a display performance characteristic in tsuà-dxv-o; compare the display performance characteristic to a predetermined performance threshold in order to determine whether the performance of the target screen is satisfied. when the performance of the target screen is te.atioiatuxiu, continue to transmit the video signal without moaification; when the performance of the target screen is liibd ^ xbEdloxiu, establish an additional connection with the web as a use of an additional fear of transmission, with the fear of additional transmission being different from a first mode of transmission through which the connection paired is established; and transmit the signal ;, from video to the target screen using the paired connection and the supplementary connection, [uObsu] Example 243: This example includes any or all of the attributes of example 242, where the display performance characteristic includes at least one of the frames even according to the video information that is displayed by the target screen, several frames of the video information that are released by the target screen, and a time between the frame updates of the target screen, s - · > 9 ...> 4. ·.] Nxempio 244: This example includes qu.al.quex 'or vudus q-íj aLiiDütos from the example zci, in which the mono crime Qu transmission and a short communication mode meixQts ottoman j. ally, making yourself. with the application requiring video information to be consistent with the second guidance. [00547] Example 250: This example includes any or all of the attributes of example 247, in. that the information «and SaO produced, at least partially, by the application, and the method additionally includes, with the device a and mobile computing: monitoring if there are changes in one. or more parameters expected from the output, application display; and in response to a detection of a change in one. or more expected parameters, transmit a message, which carries the change in one or more parameters expected from the application's expected display output to the target screen. [tnniáó] uxempio 251: This example includes any or tuuúb Οο attributes to example 25 0, in which the message includes a header that defines the change, in one or more parameters expected from the application's display output. [00549] Example 252: This example includes any or all of the attributes of example 2 51, in which the message. ii, iL ..:. u. ± aaic.1 or increase a body portion that defines a new expected value for the one or more expected parameters. lUGo./Oj üAtíapxu zzà: This example includes any or all of the attributes or example 250, where the one or more parameters expected from the application's display output tioxuem oe.xo minus one of an application's expected orientation to the display output , a scale expected by the application for display output, and a resolution expected by the application for display output. [C'ut5i. ] Εκ ^ ΐφΐΜ- zz4t this example includes any or, -x) x.k., t. · V.> To o.í. outoos of the zuü example, in which the message is con fi rmed postponed in order to make the target screen close an existing window in which the o.to video information is displayed and open one. new window to display video information- consistent with changes in one or more parameters expected from the application's display output. [tvaUzj Exmiçio z5t: This example includes any or all of the attributes of example 250, and it additionally includes, with the mobile computing device: monitor se na. receipt of a confirmation message a. from the target screen that confirms the change in one. or more expected parameters. ÍOOibsJ Example 256: This example includes any or all of the attributes of example 215, and it additionally includes, with the mobile computing device: in response to the receipt of encrypted information, route the encrypted information to the target screen for decoding. . >. uco 54] example 2uz: This example includes any or all of the attributes to example .256, in which co-recorded information includes encoded video. [<) uj nxemp.i.o 2u8: .This example includes any or ..ad.çs ub âutiüutüs of example 2h6, being oui ixxclIdually, with the mobile computing device: p. ·. ot. essax a.s znf formations linked to information oaia.icdüâs a rim to produce 'an output, of temporary frame storage. (Gççifej axempio zb9: This example includes any or all the inputs of example 219, in which the mobile computing device additionally includes a first database that correlates one or more input device outputs to one or more actions, in which the The method also included, with the mobile computing device: monitoring whether an input device output is received from at least one input device in order to determine a detected input device output; compare the device output input detected to the device outputs and input to the first database, and when the detected input device output matches or correlates to an input device output on the database input device, perform one or more actions in correlation to the output and input device in the first database. lOcca / j Example 260: This example includes any or all of the attributes of example 259, - where at least one device and input includes at least one of a mouse, weaving, trackball, trackpad and motion sensor. [D0558J Example 261: This example includes any or all of the attributes of example .259, which includes deferred, with the mobile computing device: determining whether a predetermined period of time has expired when an input device exit detected at. millstone / least one input device, and combinations thereof. LüOsoij Example 264: This example includes any or all of the minus 2 of example 2 62, wherein the at least one input device includes a button and a sensor for use, an action, and an input includes control. of a button, being: that the contextual modifier includes a combination of the input action and an output of the motion sensor. (Vbuüzsj aAfc.mpvx.o ztb; This example includes any or all of the examples 2.t9, in. One o ao] i cat í vq a-iiClsiu. An apiícaí ... ·. first database correlates a first output, from initialization device to initiation to running social media application, and a second input device output to performing an action within the media application, sucüx; and the method additionally includes, with the cuspubxLive compute movi: run the application.tivo ^ and social miaxa when the output of the input device detectsaa matches or correlates with the first output of the input device; and perform the action within the social media application when the output of input device detected matches or, if coxre.í.activates the second freckle of the input device. tOirnoj] xxempio S6: This example includes any or all attributes in example 259, in which the device a and computing moves i additionally includes a bank of security aaos that correlates one or more input device outputs to an or. more authenticated users of the mobile computing device, where convert to. output from the input device in two-dimensional screen surface coordinates; the pointer types in the temporary storage ué quadi o in a position based, at least partially, on the screen surface coordinates Midiiaeusi.Qndis; and change the. p.o.section of the digital pointer based, at least sparingly, on a detected change in the two-dimensional screen surface coordinates. tOoiibtl Example 271: This example includes any or tbQOb atxi.outíjs so example 2b8, and that the at least one input device includes at least one of a mouse, keyboard, trackball, trackpad and motion sensor . lOOcbd] Example 272: This example includes any or all of the attributes of example 268, and it also includes, with the mobile computing device: monitoring if an input device event is detected in the input device's output; and report the detected input device event to at least one center of the application and the operating system, in a way x rarer the application, the operating system or a vuwindation to perform an action consistent with the detected input device event . LüGb7Oj Example 273; This example includes any or all of the attributes in example 272, where the application includes at least one social media application. [QÜ571] Example 274: This example includes any or all of the features or example 272, in which the detected input device event includes at least one of at least one movement of at least one bi-lateral spas, a gesture with. at least one. eiitistaa device, a drag with at least one input device and a press of a button on at least one input device. 100572] Example 275: This example includes any or; .. all the attributes of example 258, in which the input device is coupled to the moving computing device by means of one. wired connection, a wireless connection or a combination thereof. (.00573J Example 276; This example includes any or all of the attributes of example 268, and additionally includes, with the mobile computing device: monitoring whether there is reception of the output of the device from etuia to the paitix of the uela-aivo; and insert a digital pointer into the frame temporary storage in a position based, at least partially, on the output of the input device. (cijs / sj Example 7 77: This example includes any or uuàub o »atiibutos oxí exemp.Lo 2. / 6, © m. that the paired connection is bidirectional and the method additionally includes, with the mobile computing device, moniiorar if receiving the output from the input device via at least the paired connection. 10057.5] Example 273: This example includes any or all of the attributes of example 2/6, including, additionally, with the mobile computing device; muni blush if receiving input from the input device via at least one support channel established between the mobile computing device and the target web, with the different foot support channel providing paired connection .. supplementary axing, an input device, a sensor and a cellular radio, Lüüoy.i. j Example 294: This example includes any or all of the attributes of example 2 92, where the one or more resources include at least one sensor selected along with the group consisting of one. camera, a global positioning sensor, a biometric digitizer, i 99592 j Example 29 5: This example includes any or all of the errors in example 219, including also, with the mobile computing device: trying to establish a wired connection or without direct wire to a long distance itiâfc; when a direct connection to a long distance network cannot be reached, send a sxnai of data to one or more elements of a network in ma.ll.K ·.:. <but the data signal is configured for. · .a. <. that allows one or more elements to route the data signal to the wide area network, both directly and as a result of damage at least one. element of the long-distance network. Íuuz93j Example 296 í This example includes any or. all of the attributes of example 2 95, in which the elements of a mesh network include at least one of an additional mobile computing device, a target screen, a WiFi network and a television blank space network. [9üoy4] Example 297: This example includes any or all attributes of example 295, in which the mobile computing device is configured to receive data signals from the wide area network directly or tbüú9cí] Example 301: This example includes any or. all attributes of example 300, in which the plurality of communication modes includes a xelativamente expensive communication mode and a non-expensive xelaixvameTi.ce communication mode, the method additionally including, with the mobile computing device: X'd -...;. u,;. x communication mono relatively tv ^ pendxoso or the non-expensive way of communicating for the transmission of the data signal with btt & e, less closely, in a comparison of the urgency level to a predetermined urgency threshold. Itaoru] Example 302- This example includes any or all »wa ux xhuu-Ob αυ example 301, and it includes« dí <_. Xonaxmeiite, with the mobile computing device: veicczunai the communication module relatively expensive for transmission the data signal when _>: iív «l ue urgent satiation or exceeds the predetermined urgency threshold; and select the re-listening mode. .actively It is inexpensive for transmitting the data signal when the level of urgency is less than the threshold is predetermined urgency. [00600] Example 303 ; This example includes any or all of the attributes of example 301, which it includes abicxonally, with the mobile computing device. Spectating the relatively high or low communication mode and the relatively expensive communication mode for transmitting the data signal when nive. that urgency meets or exceeds the urgency threshold consisting of. an application-specific integrated circuit, a general purpose processor, «combinations thereof. [υυβΐί / j Example .310: This example includes any or all of the attributes of example 308, and it also includes, with the screen: monitor if there is one received. empax'elnamento request message from a mobile or mobile device; and in response to. jamming request message, transmit the identifier message to the computing device mobile and establish the connection emparei ha. da c om O di spos mobile computing. í00608 ] Example 311: This example includes any or all the attributes of example 308, where the sign in media includes packages that encode The informations in video, and the method additionally includes: decoding the packages with the screen order to get The informations in video contained therein> [00609] Example 1 or 33.2: This example includes any or all the atxaba tos do example 308, being that includes ao.:.cxunal.mente, with the web: in response to the reception of tsm sina.i a and output from an input device, monitor if there is an input device event in the output signal; is at. response to. detection of an input device event, report the input device event to the mobile computing device through the paired connection. [OOtiü] Example 313: This example includes any or all of the attributes in example 312, ® that the screen is coxxtigured to receive the output signal through a chained connection with the input device, a wireless connection with the entry, or a combination thereof. ItOôiiq Example 314: This example includes any or all of the attributes of example 312, 'em. that the event on a device includes at least one of a mouse click, a mouse release, an input. , asia hails you from desi izsr your finger and a movement operation. Hmoizj uxempio 315: This example includes any or all of the attributes of example 312, including that additionally, with a. screen: report the entry device event to the mobile computing device at least partially, by transmitting an xelator signal containing an input device report, but the input device report identifies the input device event. [vvôuj example 31b: This example includes any or all of the attributes of example 315, where the wired interface includes a media interface, and the method includes auxcionaimeute, with the web: establishing the paired connection with the mobile computing device at least stop going immanently using the media interface; and transmit the report signal at least partially over the paired connection, L00614] Example 317- This example includes any or all of the attributes in example 315, in which the input device report includes at least one of the pixel coordinates that specify a location of the input device event and the coordinates of pixel specifying a type of event c [0 0619] Example 322: This example includes any all Qg attributes of example 319, in cue to Fnn Z O U /. ·,; · 1 slot is configured to mate with a corresponding connector of the mobile computing device when the web and mobile computing device are physically coupled. IÜÜ624] Example 327: This example includes any or. ! ..; Xicu attributes with example 32 5, where the horn of. melia used a recess to leceptively engage the mobile computing device. ituoz.5 · Example alb: This example includes any or all of the features o example 32 6, in which the screen body includes a .recess, to engage receptively with the mobile computing device, and the plug connector is local hoisted into the recess. luübltj Example 329: This example includes any or all of you in example 308, which includes »<moiona.!. mind, with the screen: establish the connection« jiiipax ha.dci at least at the same time, with the interface without communication. thread. ιυθοζ / j example 330: This example includes any or all of the ducts of example 32 9, in which the wireless interface is configured to communicate using short-range communication. [60bs8] Example 331: This example includes any or all of the auriDucts in example 330, where short-range communication includes near-field communication. [ó062aj Example 332: This example includes any or all of the attributes of example 338, where the screen includes q »u ι, υίρυ u and côid coni.iguxado pa.ra. attach txsicameute to the mobile computing device so that the aarcionaim.ente, with the screen: in response to receiving the pairing key from the mobile computing device, display the pairing key on the display, [tcozaj nxempio sat: This example includes any or all of the attributes of example 336, being which I also included, with the screen: determine if the pairing key is valid; terminate pairing with the mobile computing device when the pairing key is invalid; and establish the paired connection at least permanently, establishing a pairing session and a communication channel that allows the computation to move when the pairing key is valid, 100636] Example 339: This example includes any or all of the acronyms of example 33 8, in which the communication channel is bidirectional. [08637] Example 340; This example includes any or all of the attributes in example 338, where the communication channel is unidirectional. [00b38j Example 341: This example includes any or all of the attributes of example 338, and it additionally includes, with the cell: establishing the enipaieuiado connection using the settle communication protocol when the pairing key is valid. 100839] Example 342; Does this example include any or all of the attributes of example 341, in which the <.x protocol, miu.nl hunt s-in rio inci.ui at least one. among a protocol that uses transmission centers (TCP), a protocol auieionazamente, with the web: in response to. reception of public access, monitor if there is reception, with a connection key * [00b45] Example 348. This example includes any or all of the attributes in example 347, including ad. I. <, .. l> jixsi.lmeiite, with the screen: finish pairing with the mobile computing device when the connection key is not received within a predetermined period of time; and in response to. reception of the listening key within a predetermined period of time. 1..1 diisauuir the cnave of connection to the mobile computing device. [u0o <i6j Example 349- This example includes any or uuaub the attributes of example .3 08, where the paired connection is a point-to-point connection between the screen and the mobile computing device. [00b47j Example 350; This example includes any or all of the attributes of example 34 8, where the screen includes a memory that has a connection key stored in it, and the method additionally includes, with. the web: transmitting the connection key to the mobile computing device in response to. receipt of the public pairing request. [00t48j Example 351: This example includes any or. Therefore, the attributes of example 308, including adioionalmence, with the screen: validate a user's identity as a mobile computing device before establishing the paired connection ,. 10oun9] úxump.io 3oa: This example includes any or all of the attributes of example 308, including α.α 1 ο. ·. υηa im e c e, with t e 1 a: i n, i c i ar pairing and I.h amment with a mobile computing device - transmitting a pairing request message to the mobile computing device. [00650] Example 353: This example includes any or all of the attributes of example 352, in which the screen includes a sensor and the wireless communication interface, the method further including, with the screen: monitoring an output of at least one among the sensor and a.:.: i.uexface d · -.-. · wireless communication in order to detect the presence of a mobile computing device cosupu <_ívoxem lesposi.aa the detection of a compatible mobile computing device, start the pairing uoiii v aispubiuvo a and mobile computing compatible by m.PuxCiaxistiniô, Liànsrai having the message -of pairing request to the mobile computing device1 cempat ve1. lOOqsIj example 354: This example includes any or all of the examples in example 352, where a. pairing request message includes a te.Loi identifier and a description and communication modes supported by the screen. ίνθ65ώ.ϊ .uxenple .3.30: This example includes any or Looms us attributes of example 352, in which the screen includes wireless communication and information, and the method further includes, with the screen: transm.it go the request message. o and pairing with the use of the wireless communication interface and i, communication protocol in. short range. [uiPblj Example 356: This example includes any or all of the links to example 352, and it includes ààxxGnaisente, with the screen: establish a high-level connection with the mobile computing device before establishing the paired connection; try to establish a trustworthy, with c mobile computing device through the first level connection; complete pairing with a mobile computing device, when a root of trust is not established at the center of a predetermined period of time; and uotiuinuai to establish the paired connection with the mobile computing device when using. root of trust, and established within one. predetermined period of time. lGu6.o4.j Example 357: This example includes any or all of the attributes of example 35 6, and it includes additionally., with the screen: validating an identity of an isuario to the moving device before establishing the paired connection; terminate pairing with the mobile computing device when the user's identity is not verified within a predetermined period of time; and the continued establishment of the paired connection with the mobile computing device with the user's identity and verification within the predetermined period of time. uc65cj Examplepro 358: This example includes any or all of the addresses to the .308 example, and it additionally includes the screen: placing the screen in a pairing mode; and transmit a blocking signal, the blocking signal being configured to cause at least one second screen next to the screen to enter a <= »s.do.Q oe bioqueo in which the second screen becomes unavailable for pairing with the mobile computing device, iUOótt] Example 359: This example includes any or all of the attributes of example 3 58., in. that the placement of. web in the mode of empamento hamento occurs in response to the reception of a message. of request for oup.aiexna®ento from the e rive comoutação device, o. one delivery Friday to. screen, or a combination of them. lv 'j 6í / j Example s69: This example includes any or uudub ub exx.uutos of the example being or includes it additionally, with the screen: transmitting an A..í.bexação signal configured to release at least one second screen from the lock state. 100658] Example 361: This example includes any or icuob i.> S attributes to example 308, and it includes «d.icíenaimenta, with the screen: put the screen in a pairing mode; in response to receiving multiple stale request messages from different mobile computing devices within a specified field permee, ignore the multiple stub request messages; in response to receiving a single request to clear i.lament from a single mobile device within a specified period of time, transmit the identifier message to the mobile computing device. [u0655j Example 163: This example includes any or vudub at.ii.bu at example 3ü8, in which the traffic information includes packages that encapsulate. frames of a temporary frame storage of at least one between the application and the operating system, and the method includes additionally. with the screen: in response to receiving the media signal, process the packages xj..m ue outside the frames; and display video information on the display. LJ G6 o 0] ExtíHipxu .3 6 5: This example includes i quad or lotos the attributes of example 362, is that the frames are compressed, and the method additionally includes, with the screen: decompress the frames before displaying the information on the display. [su661J Example 364: This example includes any or all of the attributes to example 363, where the packages contain a header that identifies at least one of the type and level of compression applied to the frames, and the method additionally includes, with the web: inspect the header at a time and determine at least one of the type and level of compression before decompressing the frames, L0Ü662J Example 365: This example includes any or all of the attributes of example 362, in which the frames are encrypted frames, and the method additionally includes, with the screen: decrypts the encrypted frames in order to obtain the frames. [U06b3J Example 366: This example includes any or all of the attributes of example 3ü8, em. that the video information includes a video produced a. from the cap ... ui aos of a temperate storage of the p frame, ....:. ·,., (.; i, gm. dent. ··, and the apxicative and the operating system, the video being encoded in a video foxiúato, and the method includes additionally, with the screen: in response to the reception of the signal, media, oecodizxca.ro video and displaying the video information on the display. [tsõrlj Example 367: This example includes any or all of the attributes of example 366, in which the video is comprised, and the method includes additionally, with the ^ .fc.:. a .. de & compi. .i.m.í. x the video · before displaying the video information on the display ,. iu66os] Example 368: This example includes any or all of the attributes of example 366. where the screen is configured to receive the media signal in accordance with a real-time streaming protocol (RTSP). l00b66j Example 369: This example includes any or all w atx i.butos of example 366, - where video <1 v.i.ux-o cx j.p togx af o.QO, and the method includes, postponed Ily, with the screen: decrypt the encrypted video in order to obtain the video. [uObt / j Example 370; This example includes any or all of those created in example 303, including a.xaxonally, with the screen: monitoring a display performance characteristic of the video information display on the screen; and transmit a report to the mobile computing device, at. that the report includes the performance characteristic and is configured to cause the mobile computing device to compare the fall of the tex .is ties o and the display performance to a predetermined performance threshold in order to determine whether the performance of the screen is satisfactory . iOOhtS] Example 371: This example includes any or all of the ãi..rioutos to example 370, and it includes traditionally, with the screen: guiding the performance of the fool and nasi. istatori.o, to establish a supplementary connection with the mobile computing device an additional mode of transmission, with the transmission mode utij.c.iuna.1 being different <from a first transmission mode through which the paired connection is established; and, in response to receiving video information through the paired connection and the supplemental connection, display the video information. [üubbfj Example 372; This example includes any or all. attributes of example 370, where a. u «.x. a.u uex í e Display performance lrca includes at least one of the frames per second of the video information that is displayed by the display, several frames of the video information that are released by the display, a time between frame updates. display, and a speed at which video information is received from the mobile computing device. (uub / Oj Example 373: This example includes any or all of the attributes of example 371, where the first mode of transmission is a short-range communication mode, and the additional transmission mode is a long-range communication mode. luüo / i} Example 3/4: This example includes any or oò.yjs' ..u> atx.ibutos o o exemp.lo 3/2 ’, where the first included an additional one. portion of coroo quo def go confirmation is checked, to confirm the change with one or more expected parameters> Pes <. ·. · ..At..í :: * aocuxiipoto and in the annex are used ,,,,: -. - I *. · -; '': · dc. 'Çiçau and nau da .1 imitation and no intention to use such terms and expressions, exclude any equivalents of the resources shown and described (or modifications are possible within the scope of this interpreted to cover all of these equivalents
权利要求:
Claims (23) [1] 1, Mobile computing device characterized by comprising a processor and a memory, a. memory comprises at least one module which comprises computer-readable instructions which, when executed by said processor, cause said mobile computing device to perform the following operations which comprise: establish one. paired connection with at least one target screen via at least one of a wired and wireless communication interface, where the target screen is one. wax that is not integral to the mobile computing device; transmit at least video information generated by at least one of an application that runs on said mobile computing device and an operating system (OS.) that runs on said mobile computing device to said target screen at least through the . ç.' the amparmaoa connection; wherein said mobile computing device lacks an integral display, [2] 2, Mobile computing device, according to claim 1, characterized by the fact that it comprises a wireless communication interface. wire in which said at least one module comprises an input device module which comprises computer-readable instructions which, when executed by said processor, cause said mobile switching device to tidy up without. wire with said at least one input device by means of said wireless communication interface. [3] 3. Mobile computing device according to claim 1, characterized by the fact that said at least one module additionally comprises a device pairing module that has computer-readable pairing instructions which, when executed by said processor. cause said mobile computing device to establish said paired connection at least by carrying out pairing operations which it has understood: causing said mobile computing device to transmit a request message to the target screen, the request message being configured to cause the target screen to transmit an identifier to said moving computing device; and having the mobile computing device determine the identity of the target screen from at least said identifier. [4] 4. Mobile computing device, according to claim 3, characterized by the fact that said pairing instructions, when executed by said processor, additionally cause the mobile computing device to establish said paired connection at least partially, establishing a pairing session and a unidirectional communications channel with said target screen, and the so-called 'pairing' further comprise causing the phyto-mobile computing device to establish a communications support channel with said target screen, [5] 5. Mobile computing device, according to claim 1, is affected by the fact that said video information comprises frames of a temporary frame storage of at least one of said application that runs on said mobile computing device. and said operating system (OS) running on the mobile computing device, and said at least one module comprises a frame launcher (FT) module that includes computer-readable FT instructions, wherein said FT instructions, when executed by said processor, they cause said mobile computing device to perform the following operations that comprise: capture said pictures; encapsulating said frames in packages; o transmit said packets to said target screen through the. said paired connection, [6] Mobile computing device according to claim 5, character. due to the fact that said FT instructions, when executed by said processor, additionally cause said mobile computing device to perform the following operations which comprise .: compressing said frames before encapsulating said frames in said packages; monitor at least one monitored performance metric; and dynamically adjust at least one out of one. level and type of compression applied to said frames, at least partially, in said at least one monitored performance metric. [7] 7. mobile computing device, according to claim 1, characterized by the fact that said video information comprises frames of a temporary storage of said frame at least one of said application that is run on said mobile computing device and said operating system. (OS) that runs on said mobile computing device, and said at least one. module comprises a flow launcher (ST) module that includes computer-readable ST instructions, wherein said ST instructions, when executed by said processor, cause the mobile computing device to perform the following operations comprising: capture said pictures; convert said frames into video; and transmitting a signal containing said video to said screen. ~ al.vo through said paired connection consistent with a predetermined video transmission protocol. [8] 8. Mobile computing device according to claim 1, characterized by the fact that it additionally comprises: a first bank of associates that correlates one or more input device outputs with one or more actions; wherein said at least utb module comprises a management module comprising computer-readable management instructions, wherein said management instructions, when executed, cause said mobile computing device to perform the following operations which comprise: monitoring whether an input device output is received from at least one input device in order to determine a detected input device output; comparing the detected input device output to the input device outputs in said first database; and when said detected input device output matches or correlates with an input device output. in said database input device, performing said one or more actions in correlation to said input device output in said first database. [9] 9. Mobile computing device according to any one of claims 1 to 8, characterized by the fact that said target screen comprises one or more resources, and said computer-readable instructions of said at least one. module, when executed, cause said mobile computing device to declare control over said resources .. [10] 10. Screen characterized by comprising a display, a processor and a memory that has a device pairing module that takes computer-readable pairing instructions stored on it, in which said instructions. pairing when performed, make said fool perform the following operations that comprise: monitoring whether a pairing request message is received from said mobile computing device; and in response to said pairing request message, transmit one. identifier message to said mobile computing device, the identif loader message being configured to induce said mobile computing device to identify said screen; and establishing a paired connection with said mobile computing device by means of at least one of a wireless or wired communication interface; and in response to receiving a media signal containing at least video information from said mobile computing device via said paired connection, displaying said video information on said display. [11] 11, Screen, according to claim 10, characterized by the fact that: said media signal comprises packages that encapsulate said video information; said screen additionally comprises ; v video decoding module (VD) stored in said memory, the VD module comprising computer-readable VD instructions that, when executed by said processor, cause cause. that the screen performs the following operations that comprise .; in response to receiving said packets, decode said packets in order. d obtain the video information contained therein. [12] 12. Screen according to claim 10, characterized by the fact that it additionally comprises an input device monitoring module. (I.DM) stored in said memory, said IDM module comprising computer readable IDM instructions that, when executed by said processor, cause said screen to perform the following operations that comprise; in response to receiving an output signal from an input device, monitor the output signal for an input device event; in response to the detection of an input device event, transmitting a report signal to said mobile computing device, the report signal containing an input device report identifying the said input device event. [13] 13. Screen, according to claim 10, characterized by the fact that said paired connection is unidirectional, and said screen additionally comprises a wireless communication interface and a support channel module {BC} stored in said memory, and said BC module comprises computer-readable BC instructions that, when executed by said processor, make said screen perform the following operations that comprise: establishing a wireless support channel between said wireless communication interface and said mobile computing device; and transmitting said signal and relay to said mobile computing device through said wireless support channel, [14] 14. Screen, according to claim 10, characterized by the fact that said pairing instructions when executed by said processor, additionally cause said screen to carry out the following operations that comprise, in response to the receipt of a pairing key from said mobile computing device: displaying said pairing key on said display; determine whether said pairing key is valid; establishing said paired connection at least partially, using said pairing key; terminating pairing with the said mobile computing device when said pairing key is invalid; and establishing said paired connection at least partially, establishing a pairing session and a communications channel with said mobile computing device when a. said pairing key is valid. [15] 15. Screen, according to claim 10, expensive due to the fact that said video information comprises a video produced from the frames captured from a temporary frame storage of at least one among an application and an operating system running on said mobile computing device, the video being encoded in a video format, in between the screen additionally comprises a video decoding module (DV) stored in said memory, and said DV module comprises instructions computer-readable DV that, when executed by said processor, cause said screen to perform the following operations that comprise: in response to receiving this media signal, decode said video and display said video information on said display. [16] 16. Screen, according to claim 10, characterized by the fact that it comprises adieionaimenté a protected environment and at least one module stored in said memory, said at least one module comprising computer readable instructions · which, when executed by said processor, make said screen perform the following operations that comprise: erase at least a portion of said video information and other information received through said paired connection from said protected environment in response to at least one of: receiving a termination signal from said mobile computing device; expiration of a predetermined period of time; detecting a termination event that terminates said paired connection .; and latency detection. of communication exceeding a predetermined latency threshold < [17] 17. Screen according to any one of claims 10 to 16, characterized by the fact that it compares and addresses d i c i on aImen t e: one or more resources to supplement a capacity of said mobile computing device, upon the successful establishment of said paired connection, said one or more resources comprising at least one among a power resource, a communication resource, one. memory resource, a processing resource, an online device and a sensor; and at least one module stored in said, memory, said said at least one module comprising computer-readable instructions that, when executed by said processor, cause said screen to perform the following operations that comprise: in response to the 'establishment of said paired connection, allowing said mobile computing device to declare control over one or more resources. [18] 18. Method characterized by understanding; with a mobile computing device, transmit a video signal that comprises at least video information generated by at least one of an application that runs on said mobile computing device and an operating system that runs on said mobile computing device to a target screen through a paired connection between said mobile computing device and said target screen; on what; said paired connection is established through at least one. between a wireless and wired communication interface; said mobile computing device lacks an integral display; said target screen is not integral to said mobile computing device; and said video signal is configured to cause said target screen to display said video information. [19] 19. Method, according to claim 18 <characterized by the fact that said video information comprises frames of a temporary frame storage of at least one of said application that runs on said mobile computing device and said system operating system that runs on said mobile computing device, and the transmission of said video information comprises: capturing said frames with said mobile computing device; encapsulating said frames in packages; and transmitting said video signal, the video signal containing said packets; in which the video signal is configured to do. that the target screen processes said packages and obtains said video information. [20] 20, Method according to claim 18, characterized in that said video information comprises frames of a frame temporary storage of at least one. among said application that runs on said mobile computing device and said operating system that runs on mobile computing device, the transmission of said video information comprising: capturing said frames with said mobile computing device; convert said frames into video; and transmitting said video signal consistent with a predetermined video transmission protocol, the video signal containing said Method, according to the claim further characterized, with said mobile computing device: monitor a display performance characteristic of said target screen; compares said display performance characteristic to a predetermined performance threshold in order. to determine whether the performance of said target screen is satisfactory; when the performance of said target screen is satisfactory, continue to transmit said video signal without modification; when the performance of. said target screen is unsatisfactory, establishing a supplementary connection with said target screen with the use of one. additional transmission mode, the additional transmission mode being different from a first transmission mode whereby said, paired connection is established; and transmitting said video signal to said target screen using said paired connection and said supplementary connection, [21] 22. Method, according to claim 18, characterized by the fact that said mobile computing device additionally comprises a first database that correlates one or more outputs of: input device to one or more actions, in which the method comprises additionally, with the said mobile computing device: monitor if there is a receipt. input device output from at least one input device in order to determine a detected input device output; comparing the detected input device output to the input device outputs in said first database; and when said detected input device output matches or correlates with an input device output on said database input device, performing said one or more actions in correlation to said input device output on said first bank of data. [22] 23. The method of claim 18, characterized by the fact that it additionally comprises, with the mobile computing device: inserting a digital pointer in said frame temporary storage in a position with the base, at least partially, in an output of an input device so that said video information comprises said digital pointer. [23] 24. Method, according to claim 18, characterized by the fact that it additionally comprises, with said mobile computing device: establish an additional paired connection with at least one additional non-integral target screen; Transmitting said video signal to said target screen and said at least one non-integral target screen Method according to any of claims 18 to 24, characterized by the fact that said target screen comprises one or more resources, the method further comprising ; with the mobile computing device: declare control over said one or ···.,
类似技术:
公开号 | 公开日 | 专利标题 BR112015019749A2|2020-01-28|mobile computing device technology and systems and methods using the same. EP3533177B1|2020-04-15|Multi-blockchain network data processing method, apparatus, and server KR101941049B1|2019-04-12|Method and system for encrypted communications KR102223609B1|2021-03-05|Content sharing method and apparatus EP3513525B1|2021-08-25|Trusted execution environment secure element communication US9860738B2|2018-01-02|Method for processing multiple pieces of SIM information and electronic device thereof US9912660B2|2018-03-06|Apparatus for authenticating pairing of electronic devices and associated methods KR102194301B1|2020-12-22|Method and apparatus for connecting communication of electronic devices US20150128292A1|2015-05-07|Method and system for displaying content including security information KR102206351B1|2021-01-22|Electronic device and method for making continuity of operated work thereof CN105281907B|2020-08-07|Encrypted data processing method and device US20160241544A1|2016-08-18|User identity verification method and system, password protection apparatus and storage medium EP3018919B1|2017-03-01|Method of transmitting and receiving data of electronic device and electronic device using the method CN107959727B|2021-10-29|Method and device for communication between webpage and client KR20160009876A|2016-01-27|Electronic device and method for controlling emergency call in electronic device US10009139B1|2018-06-26|Peer-to-peer proximity pairing of electronic devices with cameras and see-through heads-up displays KR20150074415A|2015-07-02|Method for controlling an use of sim card and an electronic device thereof WO2021057982A1|2021-04-01|Application processing method and related product US20170243023A1|2017-08-24|Electronic device and operating method thereof CN105933891B|2021-03-16|Method and apparatus for providing card service using electronic device US11245694B2|2022-02-08|User terminal apparatus and control method thereof KR20150098529A|2015-08-28|Electronic device and method for control thereof
同族专利:
公开号 | 公开日 EP2972921A1|2016-01-20| US20190027111A1|2019-01-24| TWI622926B|2018-05-01| RU2625952C2|2017-07-19| US20200082782A1|2020-03-12| EP2972921A4|2016-11-23| JP2016515247A|2016-05-26| US20160027399A1|2016-01-28| GB2526217B|2020-11-04| RU2015134171A|2017-02-17| GB2526217A|2015-11-18| KR101707462B1|2017-02-16| GB201514519D0|2015-09-30| EP2972921B1|2019-09-18| US10032431B2|2018-07-24| TW201502969A|2015-01-16| CN105144130B|2019-01-29| KR20150107806A|2015-09-23| JP6142008B2|2017-06-07| WO2014151397A1|2014-09-25| CN105144130A|2015-12-09|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6973037B1|2000-05-04|2005-12-06|Nortel Networks Limited|System and method for dynamically varying integrated services digital network interface bandwidth| CN1883123A|2003-03-07|2006-12-20|诺基亚有限公司|Method and device for identifying and pairing bluetooth devices| US7130584B2|2003-03-07|2006-10-31|Nokia Corporation|Method and device for identifying and pairing Bluetooth devices| DE10328310A1|2003-06-23|2005-01-13|Alstom Technology Ltd|Method of modifying the coupling geometry of shroud segments of turbine blades| US8181022B2|2003-06-24|2012-05-15|Realnetworks, Inc.|Method and apparatus for controlling access restrictions for media playback| KR100506528B1|2003-08-12|2005-08-03|삼성전자주식회사|Mobile terminals control system using digital signature and control method thereof| JP4615276B2|2004-09-21|2011-01-19|シャープ株式会社|Content data distribution apparatus and content data distribution system| JP2006216006A|2005-02-06|2006-08-17|Hiroki Shima|Information output service providing system, and portable information terminal, output device, relay device constituting this system| US8274715B2|2005-07-28|2012-09-25|Omnivision Technologies, Inc.|Processing color and panchromatic pixels| US7881582B2|2006-06-12|2011-02-01|International Business Machines Corporation|Slowing display of digital video| US8818272B2|2007-07-18|2014-08-26|Broadcom Corporation|System and method for remotely controlling bluetooth enabled electronic equipment| US8736427B2|2008-09-03|2014-05-27|Apple Inc.|Intelligent infrared remote pairing| US8689343B2|2008-10-24|2014-04-01|Manufacturing Resources International, Inc.|System and method for securely transmitting video data| JP2012507091A|2008-10-27|2012-03-22|ソーシャル・ゲーミング・ネットワーク|Device, method and system for interactive proximity display tether| US8418211B2|2008-12-31|2013-04-09|Echostar Technologies L.L.C.|Antenna diversity for control device applications| US20100278345A1|2009-05-04|2010-11-04|Thomas Matthieu Alsina|Method and apparatus for proximity based pairing of mobile devices| US8406245B2|2009-07-09|2013-03-26|Qualcomm Incorporated|System and method of transmitting content from a mobile device to a wireless display| US8693520B2|2009-10-01|2014-04-08|Qualcomm Incorporated|Channel hopping based content protection having an out-of-band communication band| US8217997B2|2010-03-16|2012-07-10|Interphase Corporation|Interactive display system| TW201133334A|2010-03-26|2011-10-01|Cywee Group Ltd|Data transmitting device, system and method using the same| US8959234B2|2010-04-15|2015-02-17|Htc Corporation|Method and system for providing online services corresponding to multiple mobile devices, server, mobile device, and computer program product| WO2012037139A2|2010-09-13|2012-03-22|Contour, Inc.|Portable digital video camera configured for remote image acquisition control and viewing| US20120083208A1|2010-09-30|2012-04-05|Apple Inc.|Wireless accessory device pairing transfer between multiple host devices| US8937534B2|2010-12-08|2015-01-20|At&T Intellectual Property I, L.P.|Remote control of electronic devices via mobile device| US8446364B2|2011-03-04|2013-05-21|Interphase Corporation|Visual pairing in an interactive display system| JP5878424B2|2011-04-28|2016-03-08|アークレイ株式会社|Sample measuring apparatus and sample measuring system| US8650600B2|2011-06-20|2014-02-11|Enseo, Inc.|Set top/back box, system and method for providing a remote control device| US20130031261A1|2011-07-29|2013-01-31|Bradley Neal Suggs|Pairing a device based on a visual code| US8793031B2|2011-11-10|2014-07-29|Microsoft Corporation|Data selection and sharing between a vehicle and a user device| KR101522399B1|2011-12-23|2015-05-22|주식회사 케이티|Method for displaying image from handheld terminal to display device and handheld terminal thereof| US20140118222A1|2012-10-30|2014-05-01|Cloudcar, Inc.|Projection of content to external display devices| US9746926B2|2012-12-26|2017-08-29|Intel Corporation|Techniques for gesture-based initiation of inter-device wireless connections| WO2014104568A1|2012-12-27|2014-07-03|Samsung Electronics Co., Ltd.|Host device, display device, method of controlling host device, and method of controlling display device| US9386136B2|2013-01-07|2016-07-05|Cloudcar, Inc.|Automatic device initialization and pairing| US9247373B2|2013-03-01|2016-01-26|Denso International America, Inc.|Method of determining user intent to use services based on proximity| US9891068B2|2013-06-08|2018-02-13|Apple Inc.|Mapping application search function|US8903978B2|2011-06-14|2014-12-02|Sonifi Solutions, Inc.|Method and apparatus for pairing a mobile device to an output device| WO2015018058A1|2013-08-09|2015-02-12|Empire Technology Development Llc|Data relay between communication devices| JP2015070568A|2013-09-30|2015-04-13|ソニー株式会社|Information processing device, communication method, and program| US9680646B2|2015-02-05|2017-06-13|Apple Inc.|Relay service for communication between controllers and accessories| WO2015144230A1|2014-03-27|2015-10-01|Fagerhults Belysning Ab|Lighting system for providing light in a room| WO2015154250A1|2014-04-09|2015-10-15|Microsoft Technology Licensing, Llc|Hinged cover for computing device| EP3129847A4|2014-04-10|2017-04-19|Microsoft Technology Licensing, LLC|Slider cover for computing device| CA2956067A1|2014-06-02|2015-12-10|Schlage Lock Company Llc|System and method for signifying intent for lock operation| US20150350690A1|2014-06-02|2015-12-03|Sonifi Solutions, Inc.|Implementing screen sharing functionality over acommunication network| KR20150144668A|2014-06-17|2015-12-28|엘지전자 주식회사|Mobile terminal and method for controlling the same| DE102014118938B4|2014-09-01|2016-04-07|P3 Communications GmbH|Short-range communication unit with a transmitter and a receiver| DE102014014136B3|2014-09-20|2016-04-07|Audi Ag|Method and system for remotely controlling a motor vehicle| US9892628B2|2014-10-14|2018-02-13|Logitech Europe S.A.|Method of controlling an electronic device| CN106662891B|2014-10-30|2019-10-11|微软技术许可有限责任公司|Multi-configuration input equipment| RU2707874C2|2014-11-25|2019-12-02|Филипс Лайтинг Холдинг Б.В.|Lighting control based on proximity| KR102332934B1|2014-12-10|2021-11-30|삼성전자주식회사|Electornic device for connecting with other electronice devce and method for controlling thereof| US10205776B2|2014-12-23|2019-02-12|Xiaomi Inc.|Method and device for wireless connection| CN105848086B|2015-01-29|2019-08-16|宏达国际电子股份有限公司|Internet of things system and control method| JP6772187B2|2015-02-02|2020-10-21|ティーエムエー キャピタル オーストラリア ピーティーワイ リミテッド|Systems, methods and computer programs for access control systems| US9654503B1|2015-03-11|2017-05-16|Symantec Corporation|Systems and methods for evaluating networks| US9936049B2|2015-07-29|2018-04-03|Dell Products L.P.|Protocol independent way for dynamically selecting data compression methods for redirected USB devices| US10623806B2|2015-09-09|2020-04-14|Lg Electronics Inc.|Method and device for changing orientation of image by WFD sink| US10261568B2|2015-09-16|2019-04-16|Microsoft Technology Licensing, Llc|Enhancing user experience relative to peripheral devices| US9912668B2|2015-09-16|2018-03-06|Microsoft Technology Licensing, Llc|Enhancing user experience relative to peripheral devices| CA2999892A1|2015-09-30|2017-04-06|Sonifi Solutions, Inc.|Methods and systems for enabling communications between devices| US9710402B2|2015-11-10|2017-07-18|Ford Global Technologies, Llc|Method and apparatus for securing and controlling individual user data| CN105721934A|2015-11-20|2016-06-29|乐视致新电子科技(天津)有限公司|Video wireless transmission device and method, video play device and method, and system| KR20170072652A|2015-12-17|2017-06-27|삼성전자주식회사|A display apparatus and a display method| US10380037B2|2015-12-24|2019-08-13|Intel Corporation|Secure data transfer with compute stick| TWI635686B|2016-03-14|2018-09-11|佳世達科技股份有限公司|Wireless charge guiding system and guiding device| WO2017160924A1|2016-03-15|2017-09-21|Sonifi Solutions, Inc.|Systems and methods for associating communication devices with output devices| US10118696B1|2016-03-31|2018-11-06|Steven M. Hoffberg|Steerable rotating projectile| WO2017167273A1|2016-04-01|2017-10-05|腾讯科技(深圳)有限公司|Service processing method and apparatus| US20180007428A1|2016-06-29|2018-01-04|Intel Corporation|Wireless display implementation of applications| US10999331B1|2016-07-06|2021-05-04|Google Llc|Reverse discovery and pairing of client devices to a media device| CN107770360A|2016-08-18|2018-03-06|联想有限公司|Control method, terminal device and the wearable device of terminal device| JP6786967B2|2016-09-02|2020-11-18|コニカミノルタ株式会社|Information processing equipment and programs| US10482034B2|2016-11-29|2019-11-19|Microsoft Technology Licensing, Llc|Remote attestation model for secure memory applications| US10602212B2|2016-12-22|2020-03-24|Sonifi Solutions, Inc.|Methods and systems for implementing legacy remote and keystroke redirection| US11153236B2|2016-12-28|2021-10-19|T-Mobile Usa, Inc.|Real-time integration of machine intelligence into client messaging platforms| US10797505B2|2017-02-07|2020-10-06|QisdaCo., Ltd.|Wireless charging guide system, wireless charging guide method and wireless charging guide device| US10536438B2|2017-03-30|2020-01-14|Intel Corporation|Secure provision of inputs to a display transmitter device| US10779051B2|2017-04-05|2020-09-15|Panasonic Avionics Corporation|Screen mirroring from personal electronic devices to transportation vehicle display screens| US10838681B2|2017-04-05|2020-11-17|Panasonic Avionics Corporation|Screen mirroring from personal electronic devices to transportation vehicle display screens| US10353480B2|2017-04-17|2019-07-16|Essential Products, Inc.|Connecting assistant device to devices| US10355931B2|2017-04-17|2019-07-16|Essential Products, Inc.|Troubleshooting voice-enabled home setup| US10176807B2|2017-04-17|2019-01-08|Essential Products, Inc.|Voice setup instructions| US20180336010A1|2017-05-18|2018-11-22|Aiqudo, Inc.|Optimizing display engagement in action automation| US10956551B2|2017-08-07|2021-03-23|Clarius Mobile Health Corp.|Systems and methods for securing operation of an ultrasound scanner| CN111052713A|2017-09-06|2020-04-21|谷歌有限责任公司|Audio signal based recognition| TWI661395B|2017-11-15|2019-06-01|拓連科技股份有限公司|Systems and methods for parking location management for vehicles, and related computer program products| KR20190068844A|2017-12-11|2019-06-19|삼성전자주식회사|Electronic device for providing different service according to external devices| US10355773B1|2018-01-02|2019-07-16|Talal Awad|Connectivity system and method for high speed aircraft internet| US11070551B2|2018-01-18|2021-07-20|Dell Products L.P.|System and method for remote access to a personal computer as a service using a remote desktop protocol and windows hello support| KR20190088820A|2018-01-19|2019-07-29|삼성전자주식회사|Method and electronic device for controlling data communication| US20190238154A1|2018-01-31|2019-08-01|Hewlett Packard Enterprise Development Lp|Dynamic data compressions| US10373484B1|2018-03-12|2019-08-06|Ledvance Llc|Apparatus system and method for controlling multiple devices simultaneously using short-range wireless communication| US11025595B2|2018-04-16|2021-06-01|Samsung Electronics Co., Ltd.|Secure and anonymous data sharing| US10778675B1|2018-05-31|2020-09-15|Allscripts Software, Llc|Computing system for authenticating users of a shared mobile computing device| US10775853B2|2018-10-16|2020-09-15|Texas Instruments Incorporated|Secondary back surface touch sensor for handheld devices| US11017103B2|2018-11-29|2021-05-25|International Business Machines Corporation|Securely transferring computation in a disaggregated environment using a processor group key| US10826874B2|2018-11-29|2020-11-03|Mastercard International Incorporated|Direct production network access using private networks and encapsulation| US10699015B1|2020-01-10|2020-06-30|Alibaba Group Holding Limited|Method and apparatus for data transmission in a tee system| CN110399235B|2019-07-16|2020-07-28|阿里巴巴集团控股有限公司|Multithreading data transmission method and device in TEE system| US11170623B2|2019-10-29|2021-11-09|Cheryl Spencer|Portable hazard communicator device| CN111818669A|2020-06-04|2020-10-23|青岛海信移动通信技术股份有限公司|Mobile terminal and data transmission method thereof|
法律状态:
2020-03-03| B06U| Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]| 2021-10-13| B350| Update of information on the portal [chapter 15.35 patent gazette]| 2022-02-22| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 US201361790092P| true| 2013-03-15|2013-03-15| PCT/US2014/025648|WO2014151397A1|2013-03-15|2014-03-13|Mobile computing device technology and systems and methods utilizing the same| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|