Abstract:
A method for transitioning vehicle control includes obtaining a one or more operator vehicle control inputs, analyzing the one or more operator vehicle control inputs to determine operator compliance with one or more autonomous vehicle control inputs that are actively controlling motion of a vehicle, and based on the analysis of the one or more operator vehicle control inputs, allowing an operator to assume manual control of the vehicle when the operator vehicle control inputs match the one or more autonomous vehicle control inputs to within a threshold value.
Abstract:
Various embodiments for modifying learning capabilities within a decentralized system of learning devices, a method including receiving, at a learning device, a signal from a nearby device, determining whether the received signal is a learning modifier signal based on data within the received signal, and modifying one or more of the learning capabilities in response to determining that the received signal is the learning modifier signal. The method may further include determining whether subsequent learning modifier signals are received, and resetting the modified one or more of the learning capabilities in response to determining that the subsequent learning modifier signals are not received. Modifying learning capabilities may include enabling or disabling a learning mode of the learning device and/or adjusting values of variables used to calculate trigger weights of reflexes. When subsequent learning modifier signals are not received, the learning device may reset modified learning capabilities.
Abstract:
Systems and methods for provisioning devices to access a wireless communication network are described. This provisioning is based upon a correlation between a first time value when operating power is applied to a first device, and a second time value when operating power is applied to a second device. These two time values may be compared using messaging between the two devices, and provisioning information may be transmitted from one device to another based upon an observed correlation between the two time values.
Abstract:
Methods, systems, and process-readable media include an autonomous vehicle override control system that receives override commands from a pilot qualified on a first type of unmanned autonomous vehicle (UAV) and translates the inputs into suitable commands transmitted to a target UAV of a second UAV type. A pilot's certification for a first UAV type may be determined from the pilot's login credentials. The system may obtain a first control model for the first UAV type and a second control model for the target UAV. Pilot input commands processed through the first control model may be used to calculate movements of a virtual UAV of the type. The system may estimate physical movement of the target UAV similar to the first physical movement, and generate an override command for the target UAV using the second control model and the second physical movement. Control models may accommodate current conditions and pilot experience.
Abstract:
An improved wireless device generates a customized representation of a keyboard for a touch-sensitive screen. The wireless device generates an anatomical model specific to the operator of the wireless device in response to an operator contacting their fingertips in a “typing” position as if the operator were about to use a standard QWERTY keyboard. The anatomical model is used to derive a keyboard layout optimized for a present operator of the wireless device.
Abstract:
Systems, methods, and devices of the various embodiments enable content controls to be implemented by a modem of a mobile device to ensure the controls are implemented regardless of whether an application processor of the mobile device has been rooted. In an embodiment, content controls may be implemented by a modem or list component separate from the application processor when in a subsidized content delivery mode. In an embodiment, content controls may include a whitelist and/or a blacklist of IP addresses that addresses of content requests may be compared against to filter authorized content from unauthorized content. Content requests for authorized content may be sent to the content location, while content requests for unauthorized content may be dropped. In the various embodiments, a whitelist and/or blacklist may be updated on demand and/or automatically by a whitelist/blacklist management portal.
Abstract:
Methods and devices of various embodiments provide enhanced location services by leveraging a system of beacon devices each broadcasting data that is useful in calculating locations and report of the trustworthiness of neighbor beacon devices. Various embodiments include a method performed by a beacon device that may include obtaining location data using a first functionality, evaluating sensor data to identify a breach of trust condition at the beacon device, generating authentication data that indicates any identified breach of trust condition, receiving one or more neighbor beacon broadcast messages using a second functionality, determining whether the one or more neighbor beacon broadcast messages include trustworthy location data, and broadcasting an outgoing broadcast message that includes the obtained location data, timing data, the generated authentication data, and data indicating whether the one or more neighbor beacon broadcast messages include trustworthy location data.
Abstract:
Systems and methods for provisioning devices to access a wireless communication network are described. This provisioning is based upon a correlation between a first time value when operating power is applied to a first device, and a second time value when operating power is applied to a second device. These two time values may be compared using messaging between the two devices, and provisioning information may be transmitted from one device to another based upon an observed correlation between the two time values.
Abstract:
A method, system and device are provided for authenticating a signature made by a signer. When the signer is making the signature a biometric quantity associated with the signer may be sampled. The sampling generates a sequence of biometric samples of the biometric quantity. Continuity of generated sequence of biometric samples of the biometric quantity is validated. Each of the biometric samples of the biometric quantity in the generated sequence is validated. The signature of the signer may be authenticated when the generated sequence of biometric samples is validated, and a continuity of the biometric samples is validated.
Abstract:
An authentication system includes a first authentication key associated with a first device, the first authentication key having a corresponding authentication level, a second authentication key associated with a second device, the second authentication key having a corresponding authentication level, and an enhanced authentication key generated when the first and second authentication keys are combined, the enhanced authentication key having an authentication level that represents a higher authentication level than the authentication level of the first authentication key and the authentication level of the second authentication key.