Abstract:
Computationally implemented methods and systems include determining presence of one or more external linking devices within communication range of a wearable computing device designed to be worn by a person, the determining being based, at least in part, on one or more signals transmitted by the one or more external linking devices and received by the wearable computing device, and the one or more external linking devices designed to communicate beyond the communication range of the wearable computing device, and directing the wearable computing device to communicate beyond the communication range via at least one of the one or more external linking devices that were determined to be within the communication range of the wearable computing device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include determining presence of one or more external linking devices within communication range of a wearable computing device designed to be worn by a person, the determining being based, at least in part, on one or more signals transmitted by the one or more external linking devices and received by the wearable computing device, and the one or more external linking devices designed to communicate beyond the communication range of the wearable computing device, and directing the wearable computing device to communicate beyond the communication range via at least one of the one or more external linking devices that were determined to be within the communication range of the wearable computing device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
A computationally implemented system and method that is designed to, but is not limited to: electronically effecting state-machine-based emission of first-indication data indicative of first-requested-characteristic data descriptive of one or more human subjects elicited at least in part by electronic state-machine-based presentation of one or more characteristic-data-candidate prompts. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Abstract:
A computationally implemented system and method that is designed to, but is not limited to: electronically performing transistor-based reception of first query selection data related to electronic transistor-based presentation of first query selection options regarding allocation data associated with machine-automated food allocation to one or more users. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
Abstract:
Disclosed herein are example embodiments for unoccupied flying vehicle (UFV) location confirmance. For certain example embodiments, at least one machine, such as a UFV, may: (i) obtain at least one indication of at least one location of a UFV; or (ii) attempt to counter at least one attack against a location determination for the UFV. However, claimed subject matter is not limited to any particular described embodiments, implementations, examples, or so forth.
Abstract:
Computationally implemented methods and systems include receiving a generic food request from a user for one or more food items; obtaining, in response to the reception of the generic food request, user preference information of the user that indicates one or more food customization preferences of the user including at least one or more ingredient integrity preferences of the user related to integrity of one or more ingredients, the user preference information to be obtained from one or more sources other than the user; and directing automated generation of one or more customized food items in response to the received generic food request and in accordance, at least in part, with the obtained user preference information. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring image data that includes an image that contains a representation of a feature of an entity and that has been encrypted through use of a unique device code, wherein said image data further includes a privacy metadata regarding a presence of a privacy beacon associated with the entity, obtaining term data at least partly based on the acquired privacy metadata, wherein said term data corresponds to one or more terms of service that are associated with use of the image that contains the representation of the feature of the entity, and generating a valuation of the image, said valuation at least partly based on one or more of the privacy metadata and the representation of the feature of the entity in the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a captured image, wherein the captured image depicts at least one entity, performing a comparison between an estimated potential revenue generated from a distribution of the captured image and an estimated potential liability incurred for the distribution of the captured image, and modifying the captured image by placing at least one advertisement image at a particular location of the captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a captured image, wherein the captured image depicts at least one entity, performing a comparison between an estimated potential revenue generated from a distribution of the captured image and an estimated potential liability incurred for the distribution of the captured image, and modifying the captured image by placing at least one advertisement image at a particular location of the captured image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a client-based encrypted image that is a captured image that has previously been encrypted through use of a particular client code, wherein said captured image was captured by an image capture device, obtaining an indication that the client-based encrypted image was approved for decryption, said decryption configured to be carried out through use of a client-based decryption key, and procuring the client-based decryption key that is at least partly based on the particular client code, wherein the particular client code is related to a client that is associated with the image capture device. In addition to the foregoing, other aspects are described in the claims, drawings, and text.