Abstract:
A computer-implemented method for controlling time out of a device is disclosed according to an aspect of the subject technology. The method comprises determining whether at least one content-viewing criterion is satisfied; if the at least one content-viewing criterion is satisfied, then preventing the device from timing out upon expiration of a time-out period; and if the at least one content-viewing criterion is not satisfied, then timing out the device upon expiration of the time-out period.
Abstract:
Provided are methods, systems, and apparatuses for detecting, processing, and responding to audio signals, including speech signals, within a designated area or space. A platform for multiple media devices connected via a network is configured to process speech, such as voice commands, detected at the media devices, and respond to the detected speech by causing the media devices to simultaneously perform one or more requested actions. The platform is capable of scoring the quality of a speech request, handling speech requests from multiple end points of the platform using a centralized processing approach, a de-centralized processing approach, or a combination thereof, and also manipulating partial processing of speech requests from multiple end points into a coherent whole when necessary.
Abstract:
Systems and techniques are provided for aggregation of asynchronous trust outcomes in a mobile device. Trust levels may be determined from the signals. Each trust level may be determined independently of any other trust level. Each trust level may be determined based on applying to the signals heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems. An aggregated trust outcome may be determined by aggregating the trust levels. Aggregating the trust levels may include applying heuristics, mathematical optimization, decisions trees, machine learning systems, or artificial intelligence systems to the trust levels, and wherein the aggregated trust outcome; and sending the aggregated trust outcome to be implemented by the enabling, disabling, or relaxing of at least one security measure based on the aggregated trust outcome.
Abstract:
A wearable device is disclosed that, while being worn by a user, may allow a user to authenticate to a second device such as a smartphone without having to enter an unlock code such as a personal identification number. The wearable device may detect when the user removes it. Removal of the wearable device may cause it to be disabled and prevent it from being used to authenticate a subsequent user to the second device until it is re-enabled.
Abstract:
Among other things, this document describes a computer-implemented method. The method can include receiving, at a first device, an indication of user input to cause the first device to establish a wireless data connection with another device. A determination can be made at the first device that one or more sensors on the first device are oriented toward a second device. In response to at least one of (i) receiving the indication of user input to cause the first device to establish a wireless data connection with another device and (ii) determining that the one or more sensors on the first device are oriented toward the second device, a first wireless data connection can be established between the first device and the second device. A first stream of audio data can be received and played at the first device.
Abstract:
Methods for suggesting in search results an action that is to be performed in an external application based on a previous search query are provided. In one aspect, a method includes receiving, from an application on a device, a search query that was previously submitted by a user or another user, and providing, as a result of the search query, an interface to perform an action to launch an external application on the device, wherein the action was previously selected by the user or the other user in response to previous results of the search query. Systems, graphical user interfaces, and machine-readable media are also provided.
Abstract:
A first computing device provides an indication that the first computing device accepts dynamic user registration of user accounts over a wireless connection. A second computing device automatically connects to the first computing device and passes an account token to the first computing device over the wireless connection, all without physical interaction with the first computing device. The first computing device automatically contacts a remote account server to retrieve a user account associated with the account token and registers the user account with the first computing device.