摘要:
According to one embodiment of the invention, a method for discovering the presence of at least one source and target mobile device, automatically displaying a graphical interface to show the dataset from the source mobile device, and initiating the transmission of data between the mobile devices, is provided. The method further includes automatically receiving the dataset from the source mobile device, where the dataset is at least a representation of the data on the source device. In one embodiment, the representation is a subset of the data on the device and/or a description of the data on the mobile device. In another embodiment, a method for a navigation system to discover the presence of at least one mobile device, to automatically receive data from the mobile device, and to process the data with navigation operations, is provided.
摘要:
A portable electronic device includes a first type of wireless transceiver and a second type of wireless transceiver. The device determines at least one of the quantity and type of data currently required to be transmitted. One of the two transceivers is selected based on the determined type and/or quantity of data required to be transmitted. The data is then transmitted using the selected one of the wireless transceivers. Other embodiments are described and claimed.
摘要:
An apparatus and a system, as well as a method and article, may operate to receive solicited or unsolicited computing platform service information associated with services offered by a plurality of service points in a range area, store some portion of the received information, and periodically transmit, with or without confirmation, some portion of the stored information to one or more potential subscribers.
摘要:
Authenticating a user of an un-trusted computing system, the user having at least one portable computing device coupled to a peripheral device, may be accomplished by randomly generating a temporary password by the portable computing device, sending the temporary password to the peripheral device, rendering the temporary password by the peripheral device for perception by the user, inputting a password, by the user, into the un-trusted computing system, receiving, by the portable computing device, the password input by the user from the un-trusted computing system, and allowing access to the portable computing device using the un-trusted computing system when the temporary password matches the user-inputted password. In one embodiment, the peripheral device may be a small form factor device worn by the user. In one embodiment, the user may carry or have immediate access to multiple portable computing devices.
摘要:
Automatic exchange of information in an ad-hoc computing environment is disclosed. According to one embodiment of the invention, a collection agent module facilitates a search for a first device to connect to via a wireless network. The collection agent queries for and receives a first document from the first device based on metadata associated with the first document and the collection agent automatically forwards the received first document to a second device connected to the wireless network upon receiving the first document from the first device. The collection agent also automatically sends a second document to the first device upon the first device connecting to the wireless network.
摘要:
A device having a moniker to enhance privacy and power saving is described. According to one embodiment, the moniker is stored within and is associated with a first device. The moniker is provided to a second device, which sends an inquiry message, including the moniker, to the first device. The first device determines whether to respond to the inquiry message based on the moniker.
摘要:
Documents may be greeked in whole or in part prior to viewing. Embodiments of the invention enable users to selectively greek and/or ungreek their documents for viewing in public locations. Various forms of greeking and/or ungreeking may be utilized to enable the user to view the document securely in whole or in part.
摘要:
A system and method for managing private information while using semi-trusted interfaces is described. In an embodiment, an intermediate node may receive a first and second communication between a semi-trusted node and a trusted node. In managing private information, the intermediate node may append private information to the first communication sent from the semi-trusted node to the trusted node, and remove private information from the second communication sent from the trusted node to the semi-trusted node.
摘要:
Authenticating a user operating a portable computing device includes causing a sequence of images to be shown on a display, accepting an input selection from the user indicating that a currently displayed image of the sequence of images corresponds to a portion of the user's password, the user's password being known by the portable computing device, correlating the input selection to the currently displayed image, and allowing access to the portable computing device when the input selection and the currently displayed image temporally correspond to the portion of the user's password.
摘要:
Automatic exchange of information in an ad-hoc computing environment is disclosed. According to one embodiment of the invention, a collection agent module facilitates a search for a first device to connect to via a wireless network. The collection agent queries for and receives a first document from the first device based on metadata associated with the first document and the collection agent automatically forwards the received first document to a second device connected to the wireless network upon receiving the first document from the first device. The collection agent also automatically sends a second document to the first device upon the first device connecting to the wireless network.