摘要:
A wearable device that warms or cools to notify a user wearing the device is provided. The wearable device includes: a plurality of individual heating and/or cooling spots, a plurality of dots pulsating in heating/cooling sections, and/or a plurality of dots moving around in heating/cooling sections. A system is also provided comprising a wearable device, a scheduling device, and a communication between the wearable device and the scheduling device.
摘要:
A computer system includes computer program instructions. The computer program instructions include instructions to receive one or more olfactory artefacts, and decode the one or more olfactory artefacts to yield a decoded scent. Responsive to the computer system being configured for olfactory generation, the computer program instructions further include instructions to generate an olfactory scent based on the decoded scent, and emit the olfactory scent. Responsive to the computer system not being configured for olfactory generation, the computer program instructions further include instructions to generate one or more scent representations from the decoded scent. Optionally, the computer program instructions include instructions to identify one or more olfactory artefacts, encode the olfactory artefact to yield an encoded scents, and export the encoded scent. Optionally, a computer program product includes instructions to identify an olfactory artefact, encode the olfactory artefact to yield an encoded scent, and export the encoded scent.
摘要:
A wearable device that warms or cools to notify a user wearing the device is provided. The wearable device includes: a plurality of individual heating and/or cooling spots, a plurality of dots pulsating in heating/cooling sections, and/or a plurality of dots moving around in heating/cooling sections. A system is also provided comprising a wearable device, a scheduling device, and a communication between the wearable device and the scheduling device.
摘要:
A method and system are provided. The method includes training for one or more secondary signatures of a user. The method further includes identifying one or more inherent expressions of the user as the one or more secondary signatures. The method also includes authenticating the user using a primary signature and at least one of the one or more secondary signatures. The one or more inherent expressions are unintended expressions performed by the user in relation to the user providing the primary signature.
摘要:
A system or computer usable program product for providing secure user authentication including presenting a displayed representation of a three dimensional object having multiple selection areas, wherein respective selection areas are represented on at least two faces of the object and a symbol is depicted in each of the multiple selection areas; receiving a sequence of user inputs including a plurality of user selections of respective selection areas of the object indicating selection of the respective symbol and at least one user input indicating a movement of the object between the two faces so that user selection of selection areas on each of the two faces is accomplished; utilizing a processor to compare the sequence of user inputs to a predetermined authentication sequence stored in memory; and responsive to a positive comparison of the predetermined authentication sequence, providing user authentication.