Abstract:
A method at an autonomous vehicle for signaling a refueling attendant, the method including confirming that the autonomous vehicle is proximal to a refueling station; providing a signal to the refueling attendant; waiting for refueling to commence; and if, after a threshold period, refueling has not commenced, repeating the providing the signal.
Abstract:
A method, electronic device, and computer readable storage medium, for secure context-aware management of passwords stored in a password manager application in an electronic device. The password manager application prompts for entry of a password at a first user interface to unlock display of sensitive information in a second user interface. A first portion of the sensitive information is displayed in a prioritized list in the unlocked second user interface, with the second portion of the sensitive information remaining user inaccessible, only while the password manager application is in a certain password access context based on contextual information in the electronic device. The contextual information can be any combination of a current geolocation of the device, a current time, an identification of an access point in a vicinity of the device, and other contextual information.
Abstract:
Systems and methods for tracking users within a facility. The facility includes two or more zones and each facility zone is associated with a respective acoustic device. The system includes a communication module, a processor, and memory storing processor executable instructions. The instructions, when executed, cause the processor to: receive a first acoustic input from a first acoustic device associated with a first zone and determine that the first acoustic input is associated with a first user. The instructions, when executed, further cause the processor to associate the first acoustic input with the first user. Using contextual data of the first user, the instructions, when executed, further cause the processor to confirm the association of the first acoustic input with the first user and associate a location of the first user with the first zone.
Abstract:
A method of controlling selection of information on an electronic device including a display and a physical keyboard. The method includes displaying the information on the display, displaying a first selection indicator identifying a start of the selection of information, and a second selection indicator identifying an end of the selection of information, and detecting a gesture on the physical keyboard. In response to detecting the gesture, an associated one of the first selection indicator and the second selection indicator is identified based on a location of the gesture on the physical keyboard. The associated one of the first selection indicator and the second selection indicator is moved within the information based on the gesture, to move the start or the end of the selection of information and adjust the amount of the information included in the selection of information.
Abstract:
A method of controlling an electronic device having a display moveable relative to a keyboard, between a first position in which the keyboard is exposed for use and a second position in which the keyboard is not exposed. The method includes, in response to detecting initiation of control of a position of an adjustable setting within a range, entering a control mode at the electronic device, and, in response to detecting movement of the display relative to the keyboard of the electronic device, adjusting the position of the adjustable setting within the range.
Abstract:
A method at a computing device for enabling access to a credential vault if a master password for the credential vault is lost, the method including selecting at least one credential from within the credential vault; encrypting one of the master password or a vault key for the credential vault with the selected at least one credential, thereby creating a recovery file; and storing the recovery file, wherein the selected at least one credential can be used to decrypt the recovery file to enable access to the credential vault.
Abstract:
A system and method for the creation and automated selection and inclusion an automated signature text with an electronic message, wherein the automated selection of the automated signature text is dependent on attributes of the message, the designated recipients, or attributes of the designated recipients as compared to the sender's attributes, such as the encoding type and/or transport method selected for the electronic message or the location of the recipient without the need for multiple user profiles or manual editing by the sender. At least one of a plurality of automated signature texts is associated with at least one encoding type of a plurality of encoding types, at least one message transport type, or with at least one predetermined recipient attribute or the outcome of a comparison of the recipient attribute with the sender's attributes. The appropriate automated signature text is inserted prior to encoding of the message for transport.
Abstract:
The present disclosure relates to a system and method for selecting a network for use by a communication device to process a data transmission. The method comprises: determining whether an amount of data sent by the communication device over a first network in communication with the communication device has reached a data limit; and if the amount of data has reached the data limit, selecting a second network for use by the communication device.
Abstract:
A mobile communications device receives and handles an encoded message. State data about the encoded message is generated based upon a first access of the encoded message. The device stores the generated message state data in a cache of the mobile communications device; generates a message indicator based upon the message state data stored in the cache of the mobile device; and processes the encoded message on a background thread running on the mobile device. The process determines that a message state change has occurred since the message was last opened and provides an updated message indicator to a user of the mobile device that reflects the message state change.
Abstract:
In some aspects, a first device detects information encoded in a wireless authenticator device based on a wireless interaction between the first device and the wireless authenticator device. The first device detects the information while securing resources on the first device according to a first security mode. Based on the detected information, the first device selects a second security mode associated with the wireless authenticator device. The first device then applies the selected second security mode. The selected second security mode is one of multiple distinct security modes. Each of the multiple distinct security modes is associated with a respective one of multiple wireless authenticator devices and defines accessibility attributes of the resources on the first device.