Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
Abstract:
Methods for obfuscating an image of a subject in a captured media are disclosed. For example, a method receives a communication from an endpoint device of a subject indicating that the image of the subject is to be obfuscated in a captured media. The communication may include a feature set associated with the subject, where the feature set contains facial features of the subject and motion information associated with the subject. The method then detects the image of the subject in the captured media. For example, the image of the subject is detected by matching the facial features of the subject to the image of the subject in the captured media and matching the motion information associated with the subject to a trajectory of the image of the subject in the captured media. The method then obfuscates the image of the subject in the captured media.
Abstract:
Distributed computing task costing is disclosed. Costing can be employed to determine if a task will be passed to a distributed computing cluster including mobile devices. Costing can include determining a base cost value predicated on a selectable level of utility to a user of a burdened device, a base time value related to completing the task without the use of the cluster, determining a delay cost, and any monetary costs associated with performing the task without the use of the cluster. Costing can further include demining a relief cost that can include the selectable level of utility, a relief time value related to completing the task with the cluster, the delay cost, an incentive cost based on the sum across a set of relief devices and their corresponding parameters for cluster participation, and any remaining monetary costs borne by the burdened device. Where the base cost value and relief cost value satisfies conditions, a task can be divided into subtasks that can be distributed to the cluster to accomplish the task in a distributed computing environment.
Abstract:
Distributed computing task costing is disclosed. Costing can be employed to determine if a task will be passed to a distributed computing cluster including mobile devices. Costing can include determining a base cost value predicated on a selectable level of utility to a user of a burdened device, a base time value related to completing the task without the use of the cluster, determining a delay cost, and any monetary costs associated with performing the task without the use of the cluster. Costing can further include demining a relief cost that can include the selectable level of utility, a relief time value related to completing the task with the cluster, the delay cost, an incentive cost based on the sum across a set of relief devices and their corresponding parameters for cluster participation, and any remaining monetary costs borne by the burdened device. Where the base cost value and relief cost value satisfies conditions, a task can be divided into subtasks that can be distributed to the cluster to accomplish the task in a distributed computing environment.
Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
Abstract:
Obfuscating a human or other subject in digital media preserves privacy. A user of a smartphone, for example, may enable a flag for obscuring her face in digital photos or movies. When any device captures digital media, the user's smartphone transmits the flag for receipt. The device capturing the digital media is thus informed of the user's desire to obscure her face or even entire image. The device capturing the digital media may thus perform an obscuration in response to the flag.
Abstract:
Obfuscating a human or other subject in digital media preserves privacy. A user of a smartphone, for example, may enable a flag for obscuring her face in digital photos or movies. When any device captures digital media, the user's smartphone transmits the flag for receipt. The device capturing the digital media is thus informed of the user's desire to obscure her face or even entire image. The device capturing the digital media may thus perform an obscuration in response to the flag.
Abstract:
Data entry using a software keyboard such as a touchscreen keyboard is secured by varying key sizes in the keyboard from key to key and from software keyboard configuration to software keyboard configuration, decoupling display locations from keys. Multiple software keyboard configurations are generated, each having different sets of key sizes. The keyboard configuration may be changed with each keystroke, or may be changed for each prompted entry including multiple keystrokes.
Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.
Abstract:
Content is securely shared between communication devices in an ad-hoc manner by employing common sensing context to establish pairing between the communication devices. In one aspect, the communication devices are within a specified distance from each other and sense common signals from their environment over a specified time period. The common signals are analyzed to determine an initialization or session key, which is utilized to secure content transfer between the communication devices. Additionally or alternatively, the key is utilized to provide access to virtual (e.g., digital content) and/or physical (e.g., buildings) resources.