Abstract:
A method and apparatus for receiving nutritional information are disclosed. For example, the method receives a profile of a user, receives over the communications network, grocery information on one or more grocery items at one or more locations of the user, receives over the communications network, ingestion information on ingestion by the user of at least one grocery item from the one or more grocery items, generates nutritional information, wherein the nutritional information is determined by performing an analysis based on the profile of the user, the grocery information, and the ingestion information, and provides over the communications network, the nutritional information, to an endpoint device of the user.
Abstract:
A system for providing layered security is disclosed. In particular, the system may include determining a state of a first device of a device ecosystem and a state of a second device of the device ecosystem. Based on the states of the first and second devices, the system may include calculating a confidence score for the device ecosystem. If the confidence score satisfies a threshold score for enabling access to a selected system, the system may include transmitting an access code to the device ecosystem. Based on the access code, the system may enable the device ecosystem to access the selected system. If, however, the confidence score does not satisfy the threshold score, the system may include requiring the device ecosystem to provide additional authentication information in order to access the selected system.
Abstract:
Organization of a massively multiplayer online game (MMOG) via mobile units is enabled. Features of mobile units such as messaging and location based services are incorporated into the game to enhance the user experience. The MMOG provides social networking opportunities to players by associating players based on similarities such as shared interests and activities. These shared interests and activities can be determined based on associations of the players in other situations, such as disparate online games or websites. In addition, advertising content can be provided to players based on similar factors. For example, the MMOG can comprise a game similar to the offline game of tag, wherein players can “tag” each other through in-game interactions via the mobile units. These interactions can be triggered based on players being a fixed predetermined distance from each other.
Abstract:
A method includes identifying a location of at least on of a plurality of electronic devices within an area of interest. The method includes, based on at least the location of the at least one of the plurality of electronic devices, determining signal strength at a plurality of points within the area of interest. The method includes providing a modification of the area of interest to improve the signal strength at one of the plurality of points.
Abstract:
Devices, methods, and computer program products for facilitating enhanced social interactions using a mobile device are disclosed. A method for facilitating an enhanced social interaction using a mobile device includes receiving an audio input at the mobile device, determining a salient portion of the audio input, receiving relevant information associated with the salient portion, and presenting the relevant information via the mobile device.
Abstract:
A method includes receiving, at a device from a first media device, audio data and image information indicating vibrations of an object. The vibrations are caused by sound in vicinity of the object. The method includes generating audio information based on the image information. The method includes filtering the audio data based on the audio information to generate audio content associated with the first media device. The method further includes transmitting the audio content from the device to a second media device.
Abstract:
A particular method includes receiving, at a set-top box device, an activation request from a monitoring service associated with activation of a video camera coupled to the set-top box device. The activation request is received when one or more alert conditions are satisfied. The method further includes activating the video camera based on a response to a prompt.
Abstract:
Devices and methods are disclosed which relate to an electronic device having a human stimulus receptor which, when activated, suspends activation of a screensaver. The screensaver is activated to conserve the power and life of the electronic device. When latently viewing the electronic device, however, the human stimulus receptor is activated. A countdown starts counting down a pre-determined amount of time once the human stimulus receptor is inactive. At the expiration of the countdown, the screensaver is activated. The human stimulus receptor responds to skin conductivity, natural muscular twitch, pulse, skin temperature, and/or eye movement. Only when the electronic device no longer detects any of these human stimuli will the countdown begin. A user may set the predetermined amount of time.
Abstract:
A method includes receiving, at a device from a first media device, audio data and image information. The audio information indicates vibrations of an object caused by sound in a vicinity of the object. The method includes generating, at the device, an audio signal based on the audio data. The method includes transmitting the audio signal from the device to a second media device conditioned upon a quality of the audio signal satisfying a threshold. Conditioned upon the quality of the audio signal failing to satisfy the threshold, the method further includes generating audio information based on the vibrations, generating audio content associated with the first media device from the audio information, and transmitting the audio content from the device to the second media device.
Abstract:
Directional sound location is used to determine security events of a security system. A sound sensor reports a vector direction to a sound source of an acoustic signal. If the vector direction is historically observed at similar times, then perhaps the sound source is not considered a security event. However, if the vector direction is unknown or unfamiliar, the security system may infer the security event and notify emergency services.