Abstract:
A system and/or method may be provided to install applications based on location. In particular, a location of a user device may be detected. Based on the location of the user device, one or more applications may be selected to be installed automatically on the user device. Further, when the user device departs from the location, the application may automatically be uninstalled. Thus, applications may be installed and/or uninstalled on the user device based on the location of the user device. The automatically installed application may provide functionality or information associated with the location that triggered the installation. For example, a merchant's store may be associated with the merchant's application which may be installed automatically on devices of customers who enter the merchant's store.
Abstract:
In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
Abstract:
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
Abstract:
In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods are presented for modifying image parameters of an image to be captured by an image capturing device based on input from a wearable computing device. In some embodiments, the system receives image data, determines an image parameter based on the image data, and receives data from a wearable computing device positioned proximate to a subject of the image. The system modifies the image parameter based on the data received from the wearable computing device and captures the image data using the modified image parameter.
Abstract:
In various example embodiments, devices including a wearable device may be associated to share information and coordinate data between the devices as part of a coordination between relationship wearables. For example, a first wearable device and a second device, each associated with different users, may provide data to a history analysis module. The history analysis module may analyze this data for coordinated relationship patters made up of repeated events. Coordinated relationship data may be generated by this analysis, and then used by a current data analysis module to analyze an incoming stream of current data from at least one of the devices. When a repeated status value is identified within the current data stream, a coordination communication may be initiated.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods for authentication of users using online activity are provided. An authentication system may build a user profile in a database by associating online activity data with a user in the user profile, and further by processing the online activity data to generate user interest data and associating it with the user. The authentication system may receive a payment request for a purchase of an item using a payment account of the user. The authentication system may determine if the purchase of the item by the user is consistent with the user's online activity data and/or user interest data. If consistent, the authentication system may authenticate the user and process the payment request by approving the payment request.