摘要:
Methods, media and systems are disclosed in which data is transferred from a data source apparatus to an application of a data receiving apparatus using both a first protocol and a second protocol. The data receiving apparatus identifies data received via the second protocol that has not been received via the first protocol, and delivers the identified data received via the second protocol to the application.
摘要:
An embodiment of the present invention provides a method of offering incentive based context to service providers, comprising capturing context information of a user and distributing said context information to said service provider, wherein said service provider provides an incentive to said user for said context information, and wherein said user may choose all or a subset of said context information for varying types of compensation selected from the group consisting of: No compensation; Direct monetary compensation; Indirect monetary compensation; Non-monetary compensation; or Points, credits, access to free content.
摘要:
Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to be private to ensure that both endpoints are securely authenticated. Since providing a two-way or private OOB channel adds to the cost of a platform, embodiments of the invention provide for a simple and secure method for two-way authentication that uses only a non-private one-way OOB channel and thus helping to reduce platform cost. Other embodiments may be described and claimed.
摘要:
Techniques are disclosed that involve detecting and tracking groups of people associated with a user device (e.g., people watching television), and customizing the experience to the group. Various features may be employed. Such features may include classification of individuals, identification of commonly occurring groupings of people, and identification of the presence of group outsiders. Based on the presence of such individuals, groups, and/or outsiders, delivery of information to the user device may be controlled.
摘要:
An embodiment of the present invention provides an apparatus, comprising a personal device associated with a user adapted to optimize a route based on goals by predicting by the personal device associated with the user where the user is going and the user's degree of time flexibility in order to optimize a route and recommend specific stops along the way. The specific stops may be selected according to a number of goals that can be achieved at a specific stop.
摘要:
An embodiment of the present invention provides a method, comprising creating a secure profile store to maintain a version of a user's profile on each of a plurality of platforms the user may be using, offering incentive based context to service providers by capturing context information of the user, wherein the platforms owned by the user will store a local version of the user's profile in the profile store.
摘要:
An embodiment of the present invention provides a method, comprising capturing context information of a user and using heuristics based on a common knowledge database to turn location tracked over time combined with the context information into semantic location information. Embodiments of the present invention may further provide creating and identifying said heuristics and wherein trace data of GPS coordinates are obtained continuously throughout the user's day and first clustered to identify interesting locations, then up-leveled to a street address or business name and then semantically interpreted in one of several categories.
摘要:
Briefly, in accordance with one embodiment of the invention, a radio frequency identification tag system includes a lock tag to secure an item or an area, and one or more key tags associated with the lock tag to allow access to the item or area or to otherwise validate the lock tag and key tag. A detector allows access or other validation when a valid key tag is determined to be present within a predetermined range of the lock tag.
摘要:
While cloud services can offer processing from personal devices or synthesized data from multiple sources, many users prefer their data to remain private. According to some embodiments, private user data may be processed in the cloud without revealing the user identity to the cloud service provider. Only the user or an authorized agent of the user and the service's hardware platform have access to certain keys. The service application software and operating system only have access to encrypted data.
摘要:
Methods, systems and computer program products that allow for the determination of human presence in a room where content is being presented. The audio that is associated with the content may be captured, along with the audio that is being generated collectively by whatever sources may be in the room including the presentation of the content. Features may be extracted from both the content audio and the room audio. These features may then be compared, and the differences may be quantified. If the differences are significant, then human presence may be inferred.