Abstract:
Systems and methods for controlling an audio device include a system provider device that retrieves, through a network, audio device information for at least one audio device. The system provider device also receives an indication of a triggered alert from at least one of a plurality of devices. In various embodiments, the system provider device determines an alert type corresponding to the received indication of the triggered alert. In addition, the system provider device modifies an audio setting of the at least one audio device based on the determined alert type. In some examples, the system provider device further modifies the audio setting of the at least one audio device to return the modified audio setting of the at least one audio device to a pre-modified setting.
Abstract:
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
Abstract:
A method and a system implement a thermal context manager (hereinafter “TCM”) that detects a thermal state and a position of a computing device. Based on the detected thermal state(s) and the detected position(s) of the computing device, the TCM initiates an action associated with the computing device. The TCM continually monitors the computing device in order to create a thermal state profile of the computing device. To create the thermal state profile, the TCM stores data representing each detected instance of the thermal state of the computing device and data representing each detected position of the computing device.
Abstract:
Systems and methods are presented for modifying image parameters of an image to be captured by an image capturing device based on input from a wearable computing device. In some embodiments, the system receives image data, determines an image parameter based on the image data, and receives data from a wearable computing device positioned proximate to a subject of the image. The system modifies the image parameter based on the data received from the wearable computing device and captures the image data using the modified image parameter.
Abstract:
In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
Abstract:
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
A system and method includes a first device with one or more processors coupled to a memory that executes instructions from the memory to perform the steps of receiving a request to begin a videogame; streaming video of the videogame to an audience; determine a popularity of the streaming video; and changing the videogame mechanics based on the popularity of the streaming video.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods of site traffic control are disclosed. In some example embodiments, a request for an online service to perform an operation is received from a user on a client device, and at least one overload condition for the online service is detected, or otherwise determined, with the overload condition(s) corresponding to a request time of the request. A standard of restriction is selected from a plurality of standards of restriction based on the overload condition(s), and the selected standard of restriction is used as a basis for either denying or permitting the user access to the operation of the online service.