Abstract:
Users can switch between applications using contextual interface elements. These elements can include icons for applications determined to likely be accessed by the user for a current context. Information is gathered to determine the current context, then information such as patterns of historical usage are utilized to determine and rank the applications by likelihood of use. Different contexts can include different icons, and a given context can include different icons for different points in time or locations. A user can access a contextual interface element by performing a swipe motion, for example. The user can continue the motion to an area associated with an icon of interest, and perform an action such as a tap or release to cause the associated application to be launched. Such an approach enables a user to quickly and easily launch another application independent of the application currently active on the device.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.
Abstract:
An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
Abstract:
Systems, methods, and computer-readable media are disclosed for generating a baseline use profile that indicates typical patterns of use of a device over time, transitioning the device to a challenge mode when sensor data indicates a deviation from the baseline use profile by more than a permissible tolerance, presenting challenges to the user while in the challenge mode, and determining whether to restrict or allow access to device functionality based on user responses to the challenges.
Abstract:
A handheld electronic device determines its position in a moving vehicle based on changes in air pressure that occur when the vehicle undergoes acceleration. Based on a direction of acceleration that correlates to a subsequent reduction in air pressure, a determination is made as to whether the device is in the front left, front right, back left, or back right quadrant of the vehicle. The device then alters its configuration based on the quadrant in which it is located.
Abstract:
Approaches to enable a computing device, such as a phone or tablet computer, to compute a probability that the user currently using the device matches a profile of an authorized user and to set or change a security level of the computing device based on the computed probability. The security level can be one of many security levels each having a different scope of authorized access to data or functions of the computing device. The computing device may periodically re-compute the probability and change the security level whenever the probability crosses certain predefined thresholds.
Abstract:
A system and method determines whether a finger touch on a touch screen device is outside the defined boundary of a touch target. In such situations a device may adjust the location coordinates of the finger touch to adaptively correspond to an appropriate touch target based on such factors as context, region, distance from touch target, user history, device movement, parallax, etc. The method and system may also be applied to overlapping touch targets.
Abstract:
Content is presented by media devices to a user. Described herein are techniques and systems for determining occurrence of one or more events at, or proximate to, the media device. Once an event is determined, one or more actions to modify presentation of the content may be initiated. The actions may include starting presentation of the content, stopping presentation of the content, applying noise mitigation techniques to the content, and so forth. The noise mitigation techniques may include modification of an intended signal from the content to produce a noise mitigation zone 118 proximate to, or encompassing, at least a portion of the user's head.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.
Abstract:
Techniques for determining positions of devices within an environment are described herein. In some instances, an environment, such as a home or office of a user, may include an array of devices, some or all of which may couple to a network or to other devices via short-range wireless connections (e.g., Bluetooth®, Zigbee®, etc.). These devices may capture an array of data for providing to a central service, which is configured to analyze the data and, based on this analysis, determine a location of the devices relative to one another. That is, the central service may analyze the data to determine relative distances and orientations between the identified devices within the environment.