Abstract:
Approaches to enable a computing device, such as a phone or tablet computer, to compute a probability that the user currently using the device matches a profile of an authorized user and to set or change a security level of the computing device based on the computed probability. The security level can be one of many security levels each having a different scope of authorized access to data or functions of the computing device. The computing device may periodically re-compute the probability and change the security level whenever the probability crosses certain predefined thresholds.
Abstract:
A system and method determines whether a finger touch on a touch screen device is outside the defined boundary of a touch target. In such situations a device may adjust the location coordinates of the finger touch to adaptively correspond to an appropriate touch target based on such factors as context, region, distance from touch target, user history, device movement, parallax, etc. The method and system may also be applied to overlapping touch targets.
Abstract:
Content is presented by media devices to a user. Described herein are techniques and systems for determining occurrence of one or more events at, or proximate to, the media device. Once an event is determined, one or more actions to modify presentation of the content may be initiated. The actions may include starting presentation of the content, stopping presentation of the content, applying noise mitigation techniques to the content, and so forth. The noise mitigation techniques may include modification of an intended signal from the content to produce a noise mitigation zone 118 proximate to, or encompassing, at least a portion of the user's head.
Abstract:
Users can switch between applications using contextual interface elements. These elements can include icons for applications determined to likely be accessed by the user for a current context. Information is gathered to determine the current context, then information such as patterns of historical usage are utilized to determine and rank the applications by likelihood of use. Different contexts can include different icons, and a given context can include different icons for different points in time or locations. A user can access a contextual interface element by performing a swipe motion, for example. The user can continue the motion to an area associated with an icon of interest, and perform an action such as a tap or release to cause the associated application to be launched. Such an approach enables a user to quickly and easily launch another application independent of the application currently active on the device.
Abstract:
Users can switch between applications using contextual interface elements. These elements can include icons for applications determined to likely be accessed by the user for a current context. Information is gathered to determine the current context, then information such as patterns of historical usage are utilized to determine and rank the applications by likelihood of use. Different contexts can include different icons, and a given context can include different icons for different points in time or locations. A user can access a contextual interface element by performing a swipe motion, for example. The user can continue the motion to an area associated with an icon of interest, and perform an action such as a tap or release to cause the associated application to be launched. Such an approach enables a user to quickly and easily launch another application independent of the application currently active on the device.
Abstract:
Techniques for determining positions of devices within an environment are described herein. In some instances, an environment, such as a home or office of a user, may include an array of devices, some or all of which may couple to a network or to other devices via short-range wireless connections (e.g., Bluetooth®, Zigbee®, etc.). These devices may capture an array of data for providing to a central service, which is configured to analyze the data and, based on this analysis, determine a location of the devices relative to one another. That is, the central service may analyze the data to determine relative distances and orientations between the identified devices within the environment.
Abstract:
An item-providing system supplies items to a user device for consumption at the user device via communication infrastructure. The device may correspond to a book reader device or other type of device. The item-providing system uses a content delivery module to deliver the items to the user device.
Abstract:
Systems, methods, and computer-readable media are disclosed for receiving sensor data indicative of one or more vibrational and/or environmental characteristics associated with a user device, a user of the user device, and/or an environment that includes the user device; determining a value for a metric representative of the one or more characteristics; determining a value of a gesture detection parameter based at least in part on the value of the metric; receiving input corresponding to a touch event detected at a touch-sensitive display of the device; and analyzing the input based at least in part on the value of the gesture detection parameter to determine whether the touch event corresponds to a particular type of gesture.
Abstract:
Techniques are described for determining height, weight, or other characteristics of a user based on processed sensor data. The sensor data may include data collected by sensors on the user's computing device or other computing devices, or data collected by stationary, external sensors. Different types of sensor data may be processed to estimate at least one physical characteristic of the user, such as the user's height, weight, apparel size, age, and so forth. The estimated characteristics may be employed to perform actions based on the user's identity or category, to customize content delivery for the user, or for other purposes.
Abstract:
In some examples, an electronic device may include one or more recognition devices able to be used to recognize a current user. If the electronic device recognizes that a primary user, such as an owner, is currently using the electronic device, the electronic device may allow access to all of the primary user's private information and all of the features of the electronic device. On the other hand, when the electronic device determines that the current user is an unknown user, or that the current user is a known user who is authorized to access only limited information or features of the electronic device, the electronic device may send a communication to restrict the current user from accessing private information of the primary user. In some cases, the electronic device may enable the primary user to designate which items known users and/or unknown users may access.