Abstract:
Location inference using selected beacons. Data is received representing a set of beacons observed by a computing device. The beacons are located within a first geographic area. A subset (e.g., a clique) of the beacons is selected based on a coverage area of each of the beacons, where each of the beacons in the selected subset has a coverage area that overlaps with the coverage area of each of the other beacons in the selected subset. Using known or estimated positions of the beacons, a second geographic area is defined based on the selected subset of beacons and the beacon reference data and the coverage areas associated therewith. The second geographic area, smaller than the first geographic area, represents an approximate location of the computing device. In some embodiments, the computing device is calculated to be within the second geographic area with 95% probability.
Abstract:
Managing use of a location sensor on a computing device for energy efficiency. The location sensor is briefly initialized to measure the signal quality. The measured signal quality is compared to pre-defined signal criteria values. The signal criteria values correspond to acceptable energy consumption, for example. If the signal criteria values are satisfied, location information for the computing device is obtained. Otherwise, the location sensor is disabled without obtaining the location information. In some embodiments, a lower-energy location sensor is used to obtain location information to determine whether to enable a higher-energy location sensor based on expected energy consumption.
Abstract:
Embodiments infer position information using captured content items. A computing device such as a mobile computing or a cloud service analyzes one or more content items to generate information describing the content items. For content items that include photographs, for example, the photographs are processed to identify faces, objects, places, text, etc. The generated information is compared to reference content items (e.g., image comparison), user data (e.g., calendar data, contact information, etc.), and/or public data (e.g., address information, event information, etc.) to identify at least one match. Location information associated with the matched reference content items, user data, and/or public data is obtained. A position is determined for the content items based on the location information obtained from the matched reference content item, user data, and/or public data. In some embodiments, the obtained location information is used to refine a position determined using a beacon-based positioning service.
Abstract:
Generate tags for content from metadata pre-filtered based on context. A plurality of data items is accessed. Each of the data items has metadata. A context for a user is determined (e.g., at a moment of content capture). One or more of the data items are selected based on the determined context. Upon receipt of content, the received content is compared with the selected data items to identify matches. Metadata is selected from the metadata associated with the matching data items. The selected metadata is associated with the captured content.
Abstract:
A method is provided for obtaining a temporary ID. A request is created for a temporary ID for a first user that has a permanent ID for being contacted through a first mode of communication. The request, which includes at least one usage rule provided by the first user, is sent to an ID generator. A temporary ID that allows a second user to contact the first user through the first mode of communication without knowing the permanent ID of the first user is received from the ID generator. The temporary ID is mapped to the permanent ID of the first user and is mapped with the at least one usage rule. The at least one usage rule limits use of the temporary ID to contact the first user through the first mode of communication. Akso provided are a method for providing a temporary ID and a method for using a temporary ID.
Abstract:
A system (20) for controlling user access to a wireless client device (21) can include a receiver (27) and a processor (28). The processor can be programmed to enable access to a permission settings database (23) over-the-air and dynamically modify at least one permission setting for an API (24) that interfaces with an application (25) residing at least partially on the client device. The processor 28 can be programmed to authenticate an authorized administrator remotely, modify a permission setting, add or remove, update, or enable or disable security for a functional group. An enterprise server (21) can be used as the interface for changing the permissions settings remotely. Furthermore, the enterprise server can be connected through an authorization server (22) to provide any required authorization. Of course, the user can also make allowable changes to the permission settings database via a device user interface (26).
Abstract:
Networked icon (108) interacts with the electronic device user and uses user input (102), context information (104) and network information (106) to automatically update the icon's representation to the user. Icon (108) is also associated with user profile interaction history information (112), navigation logic (114), multimedia presentations (116), network interfaces (118), etc. in order to provide the user with enhanced interaction with the electronic device the icon (108) is associated with.
Abstract:
An IPC network (1900) allows for the dynamic composition of services. An IPC client (1902) can for example request a service, such as a new photo service, and teach the IPC network what service components comprise the service. The IPC server (1908) will wait until all of the required service components (1914, 1916) have registered with the IPC network (1900) prior to allowing the IPC client (1902) the go ahead to use the service. The dynamic composition of services allows clients/components operating in the IPC network (1900) to change service definitions without affecting the interprocessor communications between applications operating in the network (1900). Also, the IPC network (1900) learns dynamically the new service and is able to identify the availability of the service within the network (1900).
Abstract:
A wireless domain (602) sets a security policy for all mobile communication devices (606) within the domain by use of a system entry proxy server (604). A developer makes an application or code segment available at a developer station (600). The application is certified by a certificate defining a developer security setting. The user of the mobile communication device initiates a download of the application so that it can be installed onto the mobile communication device. The application is downloaded through the system entry proxy server which authenticates the application, then re-certifies it with a compact certificate including an operator defined security policy. In this way the operator can control which resources of the mobile communication device are accessed by all applications coming into the wireless domain.
Abstract:
A non-real time messaging system (200) for targeting messages to a subscriber unit (222) comprises a synchronized profile of where a subscriber unit should be located (a predetermined base transmission area for transmission of messages to the subscriber unit) maintained between a controller (212) and the subscriber unit. The subscriber unit detects when the subscriber unit is not within the receiving range of a predetermined base transmission area, informs the controller and the controller directs subsequent transmissions to an area identified by the subscriber unit and otherwise transmits subsequent messages to the predetermined base transmission area. The system further includes a plurality of base receivers (217) coupled to the controller for receiving transmissions from the subscriber units and allowing the controller to detect when the subscriber unit is not within the receiving range of a predetermined base transmission area.