Abstract:
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
Abstract:
A system and method includes a first device with one or more processors coupled to a memory that executes instructions from the memory to perform the steps of receiving a request to begin a videogame; streaming video of the videogame to an audience; determine a popularity of the streaming video; and changing the videogame mechanics based on the popularity of the streaming video.
Abstract:
A method may include detecting a first wireless device configured to perform short-range wireless communications and detecting a second wireless device configured to perform short-range wireless communications. The method may also include determining one or more short-range wireless connection priorities with respect to a first pairing and a second pairing. The first pairing may be with respect to short-range wireless communications between the first wireless device and a third wireless device configured to perform short-range wireless communications. The second pairing may be with respect to short-range wireless communications between the second wireless device and the third wireless device. The method may further include managing the first pairing and the second pairing based on the one or more short-range wireless connection priorities.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
Abstract:
A method may include detecting a first wireless device configured to perform short-range wireless communications and detecting a second wireless device configured to perform short-range wireless communications. The method may also include determining one or more short-range wireless connection priorities with respect to a first pairing and a second pairing. The first pairing may be with respect to short-range wireless communications between the first wireless device and a third wireless device configured to perform short-range wireless communications. The second pairing may be with respect to short-range wireless communications between the second wireless device and the third wireless device. The method may further include managing the first pairing and the second pairing based on the one or more short-range wireless connection priorities.
Abstract:
Methods, systems, and computer program products are disclosed for automatically adjusting a display to obscure application data. In an example, a computer-implemented method may include collecting eye data from a user, receiving the eye data collected from the user, analyzing the eye data, determining that eyesight of the user is on a display based on the eye data, providing data on the display to the user when the eyesight of the user is determined to be on the display, determining that the eyesight of the user is off the display, obscuring the data on the display in response to determining that the eyesight of the user is off the display, removing the obscuring applied to the data on the display when the eyesight of the user returns to the display.
Abstract:
A system or method is provided to detect the positions of various users in line and determine the users' tolerance for waiting in line. Based on the tolerance of the users for waiting in line, the system may rearrange the line positions of the users accordingly. The user's tolerance may be detected by their current position, their current movements and activities, the user's purchase or transaction history, interests and hobbies, past line waiting experience, and the like. In an embodiment, the system may determine incentives or rewards and may offer them to the users who are waiting in line to incentivize them to stay in line.
Abstract:
Devices, systems, and methods for detecting user devices to determine a state of a watched show are provided. A digital video recorder (DVR) is configured to store a media file associated with a media program. The DVR detects one or more user devices within a predetermined vicinity while the media program is being played. The DVR identifies users who are interested in the media program. The DVR tracks a watch status associated with the media program indicating which users have watched or are watching the media program based on the detected user devices. For stored media files, the DVR determines whether to delete the media file based on whether all users who are interested in the media program have completed watching the media program. The DVR may track user activity and/or vital signs based on sensor data from wearable devices, for example, to determine user reaction and/or user interests.