Abstract:
A method of estimating indoor location of an electronic device is disclosed. The electronic device will detect multiple Wi-Fi signals, each of which originates from a unique Wi-Fi access point in a building. For each of the signals, the system will determine an access point device identifier and a signal strength indicator, retrieve location coordinates for the access point; and various candidate constants to apply to a distance calculation for determining a distance from the electronic device to each of the access points. The system will repeat the distance calculation multiple times for each of the various constants and determine which constant minimizes a loss value. The system will identify a set of coordinates of the electronic device that are associated with the constant that minimizes the loss value, and then use the coordinates to estimate a location of the electronic device within the building.
Abstract:
A method of estimating indoor location of an electronic device is disclosed. The electronic device will detect multiple Wi-Fi signals, each of which originates from a unique Wi-Fi access point in a building. For each of the signals, the system will determine an access point device identifier and a signal strength indicator, retrieve location coordinates for the access point; and various candidate constants to apply to a distance calculation for determining a distance from the electronic device to each of the access points. The system will repeat the distance calculation multiple times for each of the various constants and determine which constant minimizes a loss value. The system will identify a set of coordinates of the electronic device that are associated with the constant that minimizes the loss value, and then use the coordinates to estimate a location of the electronic device within the building.
Abstract:
A system of determining a location of a mobile electronic device in an indoor environment includes an electronic device and a computer-readable storage medium having one or more programming instructions. The system determines an initial position of a mobile electronic device in an indoor environment and an initial heading of the mobile electronic device, initializes a set of particles, determines a relative location of the mobile electronic device, detects a move associated with the mobile electronic device, creates a subset of the set of particles based on the move, determines a distance between the relative location and a nearest obstacle that is encountered along a path. The system filters the particles in the subset, estimates an actual location of the mobile electronic device, and causes a visual indication of the actual location to be displayed to a user via a display of the mobile electronic device.
Abstract:
A system of identifying end-user processes in a print environment receives job data corresponding to jobs that have been processed by one or more print devices in a print environment over a time period, and identifies a plurality of processing operations initiated by a user during the time period. The system determines whether the plurality of processing operations comprise a scan processing operation that was performed after a print processing operation and within a second time period from performance of the print processing operation. In response to determining that the plurality of processing operations comprise a scan processing operation initiated by the user that was performed within the second time period from a print processing operation, the system generates a digital representation of an end user process that includes the first processing operation and the second processing operation, and presents a visual representation of the end user process for validation.
Abstract:
A method of obfuscating at least a portion of content of an email message may include identifying an email message that has been sent to one or more recipients and that pertains to one or more end user processes of a print environment, identifying a content section of the email message, and identifying one or more delimiters associated with the identified content section. The method involves determining whether the identified content section includes the delimiters, and if so, generating an obfuscated content section by obfuscating all content of the identified content section except the one or more identified delimiters. The method includes analyzing the obfuscated content section to ascertain information relevant to the one or more end user processes, and associating the ascertained information with one or more of the one or more end user processes.
Abstract:
A system of identifying end-user processes in a print environment receives job data corresponding to jobs that have been processed by one or more print devices in a print environment over a time period, and identifies a plurality of processing operations initiated by a user during the time period. The system determines whether the plurality of processing operations comprise a scan processing operation that was performed after a print processing operation and within a second time period from performance of the print processing operation. In response to determining that the plurality of processing operations comprise a scan processing operation initiated by the user that was performed within the second time period from a print processing operation, the system generates a digital representation of an end user process that includes the first processing operation and the second processing operation, and presents a visual representation of the end user process for validation.
Abstract:
A method of proactively identifying print device incidents for servicing by a service provider may include receiving print device data for one or more print devices, determining a probability value for each of the one or more of the print devices based on the print device data, where each probability value represents a likelihood that the print device will experience a subsequent incident of an incident type within a timeframe, identifying one or more of the print devices associated with probability values that each exceed a threshold value, and for one or more of the print devices that is identified, automatically initiating a service request for the subsequent incident.
Abstract:
A method and device for performing a sampling methodology for measuring power consumption for a population of power-consuming devices. The device includes a processor configured to perform the method. The method includes determining an energy consumption level for each device in a population of power-consuming devices; clustering the population of power-consuming devices into a plurality of clusters such that each of the plurality of clusters has a similar overall energy consumption; determining an estimated total energy consumption for each cluster; determining an estimated total energy consumed by the population of devices based upon the total energy consumption for each cluster, wherein the estimated total energy consumed by the population is within an acceptable uncertainty; and determining a number of samples to measure in each cluster such that the uncertainty associated with the estimated total energy consumed by the population of devices is minimized.
Abstract:
The disclosure relates to an authentication approach to grant access to a secure service on an electronic device. The authentication approach includes receiving, via an electronic device, a request to access the secure service. The authentication approach includes determining whether the electronic device is positioned at a location that corresponds to a virtual authentication lock. The authentication approach includes displaying, in response to determining the device is positioned at the location that corresponds to the virtual authentication lock, the virtual authentication lock on a display of the electronic device. The authentication approach includes receiving one or more interactions with the virtual authentication lock. The authentication approach includes determining whether the one or more interactions correspond to one or more authentication interactions related to the virtual authentication lock and granting, in response to the one or more interactions corresponding to the one or more authentication interactions, access to the secure service.
Abstract:
This document discloses methods by which an electronic device may determine a navigable path to a destination in an indoor environment without requiring data from any location-based tracking system that is external to the electronic device. The device will receive a graph representation of a map of the indoor environment, with instances of objects represented as nodes of the graph, and with open area paths represented as edges of the graph. The device will determine multiple candidate paths from a starting location to the destination location. Each of the candidate paths will include a set of node-edge combinations that extend from the starting location to the destination location. The processor will identify which of the candidate paths is a shortest path, and it will use that path to identify a navigable path to the destination.