Abstract:
Computationally implemented methods and systems include detecting presence of one or more electronic devices near a wearable computing device, the wearable computing device being a computing device designed to be worn by a user; determining which of the one or more electronic devices that are detected as being near the wearable computing device are at least designed to provide one or more specific functionalities that are being sought by the wearable computing device; and acquiring, by the wearable computing device based at least, in part, on said detecting and said determining, one or more specific functionalities that are available through at least one electronic device that was detected as being near the wearable computing device and that was determined to provide the one or more specific functionalities. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring user preference information of a user that indicates one or more customized food preferences of the user including at least one or more preferences related to integrity of one or more ingredients for use in generating one or more customized food items; identifying one or more capable automated customized food generation machines that have one or more ingredients in one or more sufficient quantities to be able to currently generate at least one customized food item in accordance with the one or more customized food preferences of the user; and presenting, in response at least in part to the identification, one or more indicators that direct the user to at least one automated customized food generation machine. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include monitoring a deployment of a privacy beacon associated with an entity, said privacy beacon configured to facilitate acquisition of one or more terms of service associated with said entity, and storing a record of the deployment of the privacy beacon associated with the entity, wherein said record is configured to be transmitted upon a particular request from a requestor entity. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a block of encrypted data that corresponds to an image that has been encrypted through use of a unique device code associated with an image capture device configured to capture the image that includes a representation of a feature of an entity, obtaining a privacy metadata that corresponds to a detection of a privacy beacon in the image, said at least one image captured by the image capture device, said privacy beacon associated with the entity, and determining, at least partly based on the obtained privacy metadata, and partly based on a calculation related to the block of encrypted data that corresponds to the whether to allow one or more processes related to the encrypted data block. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring a device-based encrypted image that is an image that has previously been encrypted through use of a particular device code associated with an image capture device configured to capture the image, wherein the image includes a representation of a feature of an entity, decrypting the device-based encrypted image in response to an indication that the image has been approved for decryption, and creating a client-based encrypted image through encryption of the decrypted image through use of a particular client code that is associated with a client that is linked to the image capture device configured to capture the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include acquiring image data that includes an image that contains a representation of a feature of an entity and that has been encrypted through use of a unique device code, wherein said image data further includes a privacy metadata regarding a presence of a privacy beacon associated with the entity, obtaining term data at least partly based on the acquired privacy metadata, wherein said term data corresponds to one or more terms of service that are associated with use of the image that contains the representation of the feature of the entity, and generating a valuation of the image, said valuation at least partly based on one or more of the privacy metadata and the representation of the feature of the entity in the image. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include detecting presence of a plurality of functional devices within the communication range of a wearable computing device; and selecting, from the plurality of functional devices, one or more functional devices for providing to the wearable computing device one or more functionalities. In addition to the foregoing, other aspects are described in the claims, drawings, and text.
Abstract:
Computationally implemented methods and systems include presenting a first augmented view of a first scene from a real environment, the first augmented view to be presented including one or more persistent augmentations in a first one or more formats, the inclusion of the one or more persistent augmentations in the first augmented view being independent of presence of one or more visual cues in the actual view of the first scene from the real environment, obtaining an actual view of a second scene from the real environment that is different from the actual view of the first scene, and presenting a second augmented view of the second scene from the real environment, the second augmented view to be presented including the one or more persistent augmentations in a second one or more formats that is based, at least in part, on multiple input factors.
Abstract:
A computationally implemented system and method that is designed to, but is not limited to: obtain information at least in part regarding one or more first aspects of one or more intermediate electronic communication devices for serving as one or more nodes of one or more standby point-to-point communication networks upon activation thereof for use by an origination electronic communication device to communicate at least in part with a destination electronic communication device, the one or more intermediate electronic communication devices having one or more second aspects as one or more mobile electronic communication devices. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.