Abstract:
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
Abstract:
This is directed to providing offline purchasing of media items using an electronic device. One or more media items that are not part of a user's media library can be stored on an electronic device. When a user later wishes to play back one of the media items, but the device cannot connect to a communications network to provide payment information for purchasing the media items, the electronic device can use pre-paid credits that were purchased and stored by the device when a communications network was available to complete the purchase. By using pre-paid credits, the media store can be assured that the user has sufficient funds for the media item purchase.
Abstract:
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
Abstract:
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
Abstract:
Systems, methods, and computer readable media for sharing awareness information are provided. A non-aware electronic device can require awareness information including, for example, information about its environment or information about its status within its environment, in order to perform a particular device operation. When the non-aware device lacks an awareness component for detecting the required type of awareness information, the non-aware device can establish a communications path with an aware device that includes such an appropriate awareness component. The aware device can share the required type of awareness information as captured by its awareness component with the non-aware device. The distance between the non-aware device and the aware device can be less than a threshold distance to ensure that the shared awareness information is relevant to the non-aware device.
Abstract:
Systems, methods, and computer readable media for sharing awareness information are provided. A non-aware electronic device can require awareness information including, for example, information about its environment or information about its status within its environment, in order to perform a particular device operation. When the non-aware device lacks an awareness component for detecting the required type of awareness information, the non-aware device can establish a communications path with an aware device that includes such an appropriate awareness component. The aware device can share the required type of awareness information as captured by its awareness component with the non-aware device. The distance between the non-aware device and the aware device can be less than a threshold distance to ensure that the shared awareness information is relevant to the non-aware device.
Abstract:
This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user's operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.
Abstract:
This is directed to providing offline purchasing of media items using an electronic device. One or more media items that are not part of a user's media library can be stored on an electronic device. When a user later wishes to play back one of the media items, but the device cannot connect to a communications network to provide payment information for purchasing the media items, the electronic device can use pre-paid credits that were purchased and stored by the device when a communications network was available to complete the purchase. By using pre-paid credits, the media store can be assured that the user has sufficient funds for the media item purchase.