Abstract:
Embodiments of mechanisms for dynamic media content type streaming management for mobile devices are generally described herein. In some embodiments, the mobile device may receive selection input pertaining to generating output from a media file containing at least two of audio data, video data, and closed-captioning data, the selection input selecting at least one of audio, video, and closed-captioning to be output during play of the media content. In some embodiments, the mobile device may generate an audio output as a signal in response to the selection input including audio. In some embodiments, the mobile device may generate a video output as a signal in response to the selection input including video. In some embodiments, the mobile device may generate a closed-captioning output as a signal in response to selection input including closed-captioning.
Abstract:
Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a performed operation.
Abstract:
A system may configure at least a low power engine (LPE) and network interface circuitry when transitioning from an active state to a low-power state. The network interface circuitry may be configured to receive information from a network and to store any received information containing audio information into a memory location. The LPE may be configured to monitor the memory location, to retrieve the stored information from the memory location, to generate audio information based on the stored information and to provide the audio information to audio circuitry for playback. It is also possible for the LPE to receive audio information from the audio circuitry, to generate information for transmission based on the audio information and to store the information into a second memory location. The network interface circuitry may then retrieve the stored information from the second memory location and transmit the information to the network.
Abstract:
A method, device, and system for conducting trusted payment transactions including establishing a trust relationship between a first mobile computing device and a second mobile computing device. The first mobile computing device may initiate a payment transaction with a point-of-sale device, communicate with the second mobile communication device to retrieve payment information from the second mobile communication device, and complete the payment transaction with the point-of-sale device using the payment information. The second mobile computing device is configured to verify the user and identity of the first mobile computing device prior to providing the payment information. Communications between the mobile computing devices may be encrypted using pre-determined encryption techniques.
Abstract:
A device, system, and method for providing processor-based data protection on a mobile computing device includes accessing data stored in memory with a central processing unit of the mobile computing device and determining that the accessed data is encrypted data based on a data included in one or more control registers of the central processing unit. If the data is determined to be encrypted data, the central processing unit is to decrypt the encrypted data using a cryptographic key stored in the central processing unit. The encrypted data may also be stored on a drive of the mobile computing device. The encryption state of the data stored on the drive is maintained in a drive encryption table, which is used to update a memory page tables and the one or more control registers.
Abstract:
Methods and systems to display, in real time, detailed attribute information regarding a calling party. This information may be presented to a user in conjunction with an incoming voice-call or message on the user's smartphone/mobile internet device (MID) or other mobile device. Such information can help him/her in real-time to decide whether to respond to the communication. Attribute information is collected at a caller attributes processing server and communicated to a receiver device of the called party.
Abstract:
Various systems and methods for locking computing devices are described herein. In an example, a portable device comprises an electro-mechanical lock; and a firmware module coupled to the electro-mechanical lock, the firmware module configured to: receive an unlock code; validate the unlock code; and unlock the electro-mechanical lock when the unlock code is validated. In another example, device for managing BIOS authentication, the device comprising an NEC module, the NEC module comprising an NEC antenna; and a firmware module, wherein the firmware module is configured to: receive an unlock code from an NEC device via the NEC antenna; validate the unlock code; and unlock a BIOS of the device when the unlock code is validated.
Abstract:
Systems and methods for forecasting discounts are described herein. In some embodiments, the systems and methods utilize marketplace information to calculate an initial probability that an item will be subject to a discount within a specified time period. The systems and methods may then utilize relevant crowd source information to weight the marketplace information and output a weighted probability of sale.
Abstract:
Systems and methods may use proximate communication to retrieve information pertaining to a target device. In one example, the method may include detecting the target device within a vicinity of a user device, receiving an information request response communication including information pertaining to the target device, and receiving an operation request response communication including information pertaining to a performed operation.
Abstract:
Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device.