Abstract:
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.
Abstract:
A system and method includes a first device with one or more processors coupled to a memory that executes instructions from the memory to perform the steps of receiving a request to begin a videogame; streaming video of the videogame to an audience; determine a popularity of the streaming video; and changing the videogame mechanics based on the popularity of the streaming video.
Abstract:
Systems and methods for controlling an audio device include a system provider device that retrieves, through a network, audio device information for at least one audio device. The system provider device also receives an indication of a triggered alert from at least one of a plurality of devices. In various embodiments, the system provider device determines an alert type corresponding to the received indication of the triggered alert. In addition, the system provider device modifies an audio setting of the at least one audio device based on the determined alert type. In some examples, the system provider device further modifies the audio setting of the at least one audio device to return the modified audio setting of the at least one audio device to a pre-modified setting.
Abstract:
A system and method includes a first device with one or more processors coupled to a memory that executes instructions from the memory to perform the steps of receiving a request to begin a videogame; streaming video of the videogame to an audience; determine a popularity of the streaming video; and changing the videogame mechanics based on the popularity of the streaming video.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
Systems and methods are provided for providing access to secure-access facilities based on pairing of the secure-access facilities with a user device such as a wearable device. A pairable secure-access facility may be a public storage facility or device such as a locker that includes communications circuitry for pairing with the user device. Once paired with the user device, the locker may operate a locking mechanism to lock the locker when the user device is away from the locker and to unlock the locker when the user device is in the vicinity of the locker. The locker may include a beacon for detecting and pairing with the user devices. Pairing the user device and the locker may include entering a locker identifier into the user device to ensure that the intended user device is paired with the intended locker.
Abstract:
There are provided systems and methods for using a wireless beacon to provide access credentials to a secure network. A network access device, such as a WiFi router, may provide a secure wireless network requiring access credentials to access the network. For example, the network may be password protected to prevent unauthorized used. Additionally, the network may have various levels of use, such as access depending on a security clearance for a user or data transfer and usage rates. Each of the various levels of use may require a separate access credential. A wireless beacon may be configured to connect to user devices that are near or within an area covered by the network. The connection between a user device and the beacon may be utilized to determine the proper access credential for the user device and push the access credential to the user device.
Abstract:
Methods, systems, and computer program products are disclosed for automatically adjusting a display to obscure application data. In an example, a computer-implemented method may include collecting eye data from a user, receiving the eye data collected from the user, analyzing the eye data, determining that eyesight of the user is on a display based on the eye data, providing data on the display to the user when the eyesight of the user is determined to be on the display, determining that the eyesight of the user is off the display, obscuring the data on the display in response to determining that the eyesight of the user is off the display, removing the obscuring applied to the data on the display when the eyesight of the user returns to the display.
Abstract:
In various example embodiments, devices, systems, and methods for a waist measuring belt are provided. An example waist measuring belt is made up of a belt buckle frame with attachments for a belt strap. The belt further includes a position measuring module coupled to the belt buckle frame that measures an attachment position of a second end of the belt strap to the belt buckle frame. The belt also includes a tension measuring module coupled to the belt buckle frame that measures a tension through the belt buckle frame and the belt strap. A memory and a wireless communication module attached to the belt may be used to store measurements and communicate with a mobile device or server. In various embodiments, estimated user waist sizes over time using measured values and belt-specific data may be used to estimate a user's waist size and generate a waist size history.
Abstract:
Systems and methods are provided for authenticating an account via a hands-free gesture, such as a tap, pattern of taps, or other physical gesture not requiring a user to hold a computing device. A user can initiate a transaction to purchase an item by interacting with a first computing device (e.g., electronic kiosk, point-of-sale terminal, automated checkout device, etc.). The first computing device can receive a request from the user to purchase the item. In response, the first computing device can broadcast an authentication request. The user can perform the hands-free gesture for detection by a second computing device (e.g., the user's mobile device). The second computing device can transmit information associated with the hands-free gesture in response to the authentication request. The first computing device can authenticate the user based on the information associated with the hands-free gesture.