Abstract:
A method to share map information between an electronic device and other nearby devices using peer-to-peer communication is provided. The method receives identification of different map items such as a route, points of interest, search results, a current map view and sends to a selected nearby device. The method provides different options to select the map items to share. The particular map information to share in some embodiments depends on what is currently displayed and/or selected on the map. When there are several items that can be shared and there is not a clear indication for what the user intends to share, an action list is shown to allow the user to select the information to share. Once a map item to share is selected, the method displays a share list to display a list of nearby devices. The method sends the shared information to selected devices.
Abstract:
The described embodiments comprise an electronic device that executes an application, the electronic device including a processing subsystem. In these embodiments, the processing subsystem is configured to acquire a receipt associated with the application, wherein the application was purchased by a purchasing entity and installed on the electronic device after being assigned to a user of the electronic device by the purchasing entity. The processing subsystem is further configured to determine, using the receipt, if the application has expired. When the application has not expired, The processing subsystem is configured to execute the application with predetermined functions of the application enabled. When the application has expired, The processing subsystem is configured to execute the application with the predetermined functions of the application disabled.
Abstract:
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for utilizing a secondary application to render invitational content. Primary content rendered by a web browser can be embedded with a command requesting that a secondary application be executed. The secondary application can be executed in a secured sand box environment and configured to render invitational content in a second window above the primary content. The secondary application can be known and trusted by the operating system to gather sensitive data used to select appropriate invitational content. Further, data can be included in the command requesting that the secondary application be executed. The invitational content can be associated with secondary views that can be rendered without affecting the primary content. The secondary application can collect data to render the secondary view, such as the exact point selected, which is used to render graphical transition effects leading to the secondary view.
Abstract:
An electronic device that is in communication with one or more wearable audio output devices detects occurrence of one or more first event while the one or more wearable audio output devices are being worn by a user. In response, the electronic device outputs, via the one or more wearable audio output devices, audio content corresponding to the one or more first events. After outputting the audio content corresponding to the one or more first events, the electronic device detects movement of the one or more wearable audio output devices, and in response to detecting the movement, and in accordance with a determination that a first movement of the one or more wearable audio output devices meets first movement criteria, outputs, via the one or more wearable audio output devices additional audio content corresponding to one or more events.
Abstract:
The present disclosure generally relates to controlling electronic devices. In some examples, the electronic device uses gaze information to activate a digital assistant. In some examples, the electronic device uses gaze information to identify an external device on which to act. In some examples, the electronic device provides an indication that distinguishes between different speakers.
Abstract:
A request to display a user interface that includes a menu along a first edge of a user interface that corresponds to a first edge of a display region is received. The menu includes multiple menu objects, including a first and a second menu object. In response to receiving the request, and if the display generation component is not capable of displaying content in a respective portion of the first edge of the display region, the first menu object is displayed on a first side and the second menu object is displayed on a second side of the respective portion, such that the respective portion is between the first menu object and the second menu object met. And, if the display generation component is capable of displaying content in the respective portion, the first and second menu objects are displayed adjacent to one another in the display region.
Abstract:
A second user can authorize a first user to take or complete an online action by submitting one or more biometric images. For example, the second user can authorize a purchase by the first user on an online store. The second user can submit the one or more biometric images on the electronic device being used by the first user, or the second user can submit the biometric image or images remotely using another electronic device.
Abstract:
In one embodiment, a unique (or quasi unique) identifier can be received by an application store, or other on-line store, and the store can create a signed receipt that includes data desired from the unique identifier. This signed receipt is then transmitted to a device that is running the application obtained from the on-line store and the device can verify the receipt by deriving the unique (or quasi-unique) identifier from the signed receipt and comparing the derived identifier with the device identifier stored on the device, or the vendor identifier assigned to the application vendor.
Abstract:
Server-side authentication of user accounts by using multiple authentication tokens and transmission of update statement to users for updates to applications installed on their devices. Prompting users that updates are available upon determining that a threshold event has occurred and if requisite network and situational conditions exist. Batching and sending notifications or requests for authentications that are required for each application update that is currently ready for download.
Abstract:
A second user can authorize a first user to take or complete an online action by submitting one or more biometric images. For example, the second user can authorize a purchase by the first user on an online store. The second user can submit the one or more biometric images on the electronic device being used by the first user, or the second user can submit the biometric image or images remotely using another electronic device.