Abstract:
Techniques are described for determining height, weight, or other characteristics of a user based on processed sensor data. The sensor data may include data collected by sensors on the user's computing device or other computing devices, or data collected by stationary, external sensors. Different types of sensor data may be processed to estimate at least one physical characteristic of the user, such as the user's height, weight, apparel size, age, and so forth. The estimated characteristics may be employed to perform actions based on the user's identity or category, to customize content delivery for the user, or for other purposes.
Abstract:
In some examples, an electronic device may include one or more recognition devices able to be used to recognize a current user. If the electronic device recognizes that a primary user, such as an owner, is currently using the electronic device, the electronic device may allow access to all of the primary user's private information and all of the features of the electronic device. On the other hand, when the electronic device determines that the current user is an unknown user, or that the current user is a known user who is authorized to access only limited information or features of the electronic device, the electronic device may send a communication to restrict the current user from accessing private information of the primary user. In some cases, the electronic device may enable the primary user to designate which items known users and/or unknown users may access.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.
Abstract:
Described herein are systems, devices and methods for presenting content based on the spatial relationship between a media device and a user of the media device. The media device may present content based on an angle between an eye axis of the user and a device axis of the media device.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.
Abstract:
A settings service running on a server remote from a computing device can identify at least one settings group to which the computing device belongs. The settings service can identify all settings that are included in the at least one settings group to which the device belongs. The settings service can compare all the settings and detect any conflicting settings. If there are conflicting settings, the service can choose which of the conflicting settings takes priority, in order to resolve the conflict. For example, a default setting can be overridden by a setting with a higher priority. After resolving the conflict, the settings service can merge the conflicting setting(s) which takes priority, as well as the non-conflicting settings, into a single set of settings to be applied to the device. The settings service can transmit the set of settings to the computing device to be applied.
Abstract:
Approaches to enable a computing device, such as a phone or tablet computer, to compute a probability that the user currently using the device matches a profile of an authorized user and to set or change a security level of the computing device based on the computed probability. The security level can be one of many security levels each having a different scope of authorized access to data or functions of the computing device. The computing device may periodically re-compute the probability and change the security level whenever the probability crosses certain predefined thresholds.
Abstract:
Content is presented by media devices to a user. Described herein are techniques and systems for determining occurrence of one or more events at, or proximate to, the media device. Once an event is determined, one or more actions to modify presentation of the content may be initiated. The actions may include starting presentation of the content, stopping presentation of the content, applying noise mitigation techniques to the content, and so forth. The noise mitigation techniques may include modification of an intended signal from the content to produce a noise mitigation zone 118 proximate to, or encompassing, at least a portion of the user's head.
Abstract:
A system and method for identifying a user of a device includes comparing audio received by a device with acoustic fingerprint information to identify a user of the device. Image data, video data and other data may also be used in the identification of the user. Once the user is identified, operation of the device may be customized based on the user. Further, once the user is identified, data can be associated with the user, for example, usage data, location data, gender data, age data, dominant hand data of the user, and other data. This data can then be used to further customize the operation of the device to the specific user.