Abstract:
Motion sensors of a mobile device mounted to a vehicle are used to detect a mount angle of the mobile device. The motion sensors are used to determine whether the vehicle is accelerating or de-accelerating, whether the vehicle is turning and whether the mount angle of the mobile device is rotating. The mount angle of the mobile device is obtained from data output from the motion sensors and can be used to correct a compass heading. Data from the motion sensors that are obtained while the vehicle is turning or the mobile device is rotating are not used to obtain the mount angle.
Abstract:
Motion sensors of a mobile device mounted to a vehicle are used to detect a mount angle of the mobile device. The motion sensors are used to determine whether the vehicle is accelerating or de-accelerating, whether the vehicle is turning and whether the mount angle of the mobile device is rotating. The mount angle of the mobile device is obtained from data output from the motion sensors and can be used to correct a compass heading. Data from the motion sensors that are obtained while the vehicle is turning or the mobile device is rotating are not used to obtain the mount angle.
Abstract:
A dynamic access server engine on a server may be configured to receive a request for access to a restricted area during a specific time period. If there is no scheduling conflict the engine can schedule the access period. Additionally, the request may be associated with one or more invitees. For each invitee, the engine determines whether the invitee is authorized to temporarily access the restricted area. If authorized, the engine automatically grants to the invitee temporary access to the restricted area during the scheduled period.
Abstract:
A dynamic access server engine on a server may be configured to receive a request for access to a restricted area during a specific time period. If there is no scheduling conflict the engine can schedule the access period. Additionally, the request may be associated with one or more invitees. For each invitee, the engine determines whether the invitee is authorized to temporarily access the restricted area. If authorized, the engine automatically grants to the invitee temporary access to the restricted area during the scheduled period.