Abstract:
Approaches for analyzing driver pattern deviations and reproducing the pattern deviations in a user interface or a driving simulator are provided. A computer-implemented method includes: collecting, by a server, data from plural vehicles; determining, by the server, a baseline for a driving action based on the data from the plural vehicles; identifying, by the server, a problem action for a driver based on the baseline; and generating, by the server, an interface to display the problem action.
Abstract:
A computer-implemented method includes: receiving, by a computing device, network communications information for a plurality of user devices during a presentation; determining, by the computing device, user device activity for each of the plurality of user devices based on the network communications information; determining, by the computing device, a respective audience interest score for each of the plurality of user devices based on the user device activity; generating, by the computing device, a report representing the audience interest scores; and displaying, by the computing device, the report.
Abstract:
A mobile device includes a pre-authentication mechanism that allows a user to define a pre-authentication sequence that includes actions such as movement of the device, taps on the screen, key presses, etc., or any suitable combination of these. Correctly entering the pre-authentication sequence gives the user access to the main authentication screen for the device, while a failure to enter the pre-authentication sequence correctly keeps the device locked. Multiple pre-authentication sequences can be defined, each having a corresponding sleep time threshold. This requires the user to enter the appropriate authentication information corresponding to the time the device has been asleep. Multiple pre-authentication sequences can also be defined, each having corresponding authentication information. Thus, the authentication information the user needs to enter can be a function of the corresponding pre-authentication sequence.
Abstract:
A method and system for sharing route information within a group of travelers is provided. The method includes a subscriber device requesting to join a route to a destination created by a master device. Once the subscriber device has joined the route, the subscriber device receives periodic updates to the route. At any point in time, the subscriber device can request to change roles with the master device, where the subscriber device takes on the role of the new master, and the former master device becomes a subscriber or follower.
Abstract:
A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger position on an interface of the device, number of taps on the interface of the device, or touching of the interface in a predefined area. Alternatively, the user can provide a verbal passphrase with inflection points.
Abstract:
Approaches for analyzing driver pattern deviations and reproducing the pattern deviations in a user interface or a driving simulator are provided. A computer-implemented method includes: collecting, by a server, data from plural vehicles; determining, by the server, a baseline for a driving action based on the data from the plural vehicles; identifying, by the server, a problem action for a driver based on the baseline; and generating, by the server, an interface to display the problem action.
Abstract:
A method for securely authenticating users of a device which uses pairings of a verbal passphrase and user interactions. The user interactions may be finger position on an interface of the device, number of taps on the interface of the device, or touching of the interface in a predefined area. Alternatively, the user can provide a verbal passphrase with inflection points.
Abstract:
A mobile device includes a pre-authentication mechanism that allows a user to define a pre-authentication sequence that includes actions such as movement of the device, taps on the screen, key presses, etc., or any suitable combination of these. Correctly entering the pre-authentication sequence gives the user access to the main authentication screen for the device, while a failure to enter the pre-authentication sequence correctly keeps the device locked. Multiple pre-authentication sequences can be defined, each having a corresponding sleep time threshold. This requires the user to enter the appropriate authentication information corresponding to the time the device has been asleep. Multiple pre-authentication sequences can also be defined, each having corresponding authentication information. Thus, the authentication information the user needs to enter can be a function of the corresponding pre-authentication sequence.