Abstract:
A method, which is performed in a first electronic device, for authorizing access to a second electronic device is disclosed. The method may include establishing communication between the first electronic device and the second electronic device. The method may also obtain data indicative of a motion of at least one of the first and second electronic devices in response to a movement of the at least one of the first and second electronic devices. Based on the data, a control signal authorizing access to the second electronic device is generated, and transmitted to the second electronic device.
Abstract:
A method for performing a function in an electronic device is disclosed. The method may include receiving an input sound stream including a speech command indicative of the function and identifying the function from the speech command in the input sound stream. Further, the method may determine a security level associated with the speech command. It may be verified whether the input sound stream is indicative of a user authorized to perform the function based on the security level. In response to verifying that the input sound stream is indicative of the user, the function may be performed.
Abstract:
A method, which is performed in an electronic device, for activating a target application is disclosed. The method may include receiving an input sound stream including an activation keyword for activating the target application and a speech command indicative of a function of the target application. The method may also detect the activation keyword from the input sound stream. If the activation keyword is detected, a portion of the input sound stream including at least a portion of the speech command may be buffered in a buffer memory. In addition, in response to detecting the activation keyword, the target application may be activated to perform the function of the target application.
Abstract:
A method, performed by a connection manager, for connecting an input device and one of a plurality of electronic devices as a target device is disclosed. The method includes detecting a face of a user in a captured image, and determining a first gaze direction of the user from the face of the user in the captured image. Based on the first gaze direction, the method determines the target device in the plurality of electronic devices and connects the input device and the target device.
Abstract:
A method for communicating messages by a mobile device via a sound medium is disclosed. The mobile device receives input sounds from at least one mobile device via the sound medium. From the input sounds, an input sound signal carrying a first message encoded with a first key is detected. The mobile device decodes the first message based on a matching key. An output sound signal carrying a second message encoded with a second key is generated. Further, the mobile device transmits an output sound corresponding to the output sound signal via the sound medium.
Abstract:
A method for controlling an application in a mobile device is disclosed. The method includes receiving environmental information, inferring an environmental context from the environmental information, and controlling activation of the application based on a set of reference models associated with the inferred environmental context. In addition, the method may include receiving a sound input, extracting a sound feature from the sound input, transmitting the sound feature to a server configured to group a plurality of mobile devices into at least one similar context group, and receiving, from the server, information on a leader device or a non-leader device and the at least one similar context group.
Abstract:
According to an aspect of the present disclosure, a method for controlling access to a plurality of electronic devices is disclosed. The method includes detecting whether a first device is in contact with a user, adjusting a security level of the first device to activate the first device when the first device is in contact with the user, detecting at least one second device within a communication range of the first device, and adjusting a security level of the at least one second device to control access to the at least one second device based on a distance between the first device and the at least one second device.
Abstract:
A method for generating a notification by an electronic device to alert a user of the electronic device is disclosed. In this method, a speech phrase may be received. Then, the received speech phrase may be recognized, by a processor, as a command to generate the notification. In addition, one or more context data of the electronic device may be detected by at least one sensor. It may be determined whether the notification is to be generated at least based on the context data. The notification may be generated, by the processor, based on the context data and the command to generate the notification.
Abstract:
A method and apparatus for performing a function in a mobile device are disclosed. A media sound from a sound output device external to the mobile device is captured and a sound feature is extracted from the captured media sound. A function to be performed in the mobile device is determined by identifying at least one reference sound feature in a set of reference sound features based on the extracted sound feature, each reference sound feature in the set of reference sound features being associated with at least one of a plurality of media sounds and at least one of a plurality of functions. Further, the determined function is performed in the mobile device.
Abstract:
A method for controlling access to a plurality of applications in an electronic device includes receiving a voice command from a speaker for accessing a target application among the plurality of applications, and verifying whether the voice command is indicative of a user authorized to access the applications based on a speaker model of the authorized user. In this method, each application is associated with a security level having a threshold value. The method further includes updating the speaker model with the voice command if the voice command is verified to be indicative of the user, and adjusting at least one of the threshold values based on the updated speaker model.