Abstract:
Dynamically evaluating candidate connections as alternatives to an active connection between a first computing device and a second computing device. The first computing device transitions to one of the candidate connections to replace the active connection based on the evaluation. The evaluation and transition occurs based on time intervals, events, or conditions. Maintaining the candidate connections enables mobile devices, for example, to be resilient to and tolerant of topology changes affecting the active connection.
Abstract:
Embodiments enhance the functionality of a vehicle, a user device, or both by the selection and sharing of data. Upon detection of each other, the vehicle device and the user device obtain and share data. The data may be associated with the user, the user computing device, and/or the vehicle and may be stored in cloud-based services. Functionality of the vehicle and/or user device is customized to the user based on the shared data. For example, the user device may provide assisted global positioning system (GPS) data to the vehicle to reduce a time-to-fix (TTF) when determining a location of the vehicle. In other examples, settings of the vehicle are personalized to the user, and location-relevant content is downloaded to the user device.
Abstract:
Embodiments order observed beacons based on relative signal strength to create a correspondence between beacon sets and positions. A computing device such as a mobile device provides a positioned observation including a plurality of observed beacons and a position of the mobile device during observation. The observed beacons are ordered based on quality indicators such as signal strength relative to each other. A set of the beacons are selected based on the ordering (e.g., the beacons with the strongest signal strength are selected in order). The position of the observing mobile device is associated with the beacon set to enable location inference for other devices providing observations including the same beacon set.
Abstract:
Location inference using selected beacons. Data is received representing a set of beacons observed by a computing device. The beacons are located within a first geographic area. A subset (e.g., a clique) of the beacons is selected based on a coverage area of each of the beacons, where each of the beacons in the selected subset has a coverage area that overlaps with the coverage area of each of the other beacons in the selected subset. Using known or estimated positions of the beacons, a second geographic area is defined based on the selected subset of beacons and the beacon reference data and the coverage areas associated therewith. The second geographic area, smaller than the first geographic area, represents an approximate location of the computing device. In some embodiments, the computing device is calculated to be within the second geographic area with 95% probability.
Abstract:
Managing use of a location sensor on a computing device for energy efficiency. The location sensor is briefly initialized to measure the signal quality. The measured signal quality is compared to pre-defined signal criteria values. The signal criteria values correspond to acceptable energy consumption, for example. If the signal criteria values are satisfied, location information for the computing device is obtained. Otherwise, the location sensor is disabled without obtaining the location information. In some embodiments, a lower-energy location sensor is used to obtain location information to determine whether to enable a higher-energy location sensor based on expected energy consumption.
Abstract:
Embodiments infer position information using captured content items. A computing device such as a mobile computing or a cloud service analyzes one or more content items to generate information describing the content items. For content items that include photographs, for example, the photographs are processed to identify faces, objects, places, text, etc. The generated information is compared to reference content items (e.g., image comparison), user data (e.g., calendar data, contact information, etc.), and/or public data (e.g., address information, event information, etc.) to identify at least one match. Location information associated with the matched reference content items, user data, and/or public data is obtained. A position is determined for the content items based on the location information obtained from the matched reference content item, user data, and/or public data. In some embodiments, the obtained location information is used to refine a position determined using a beacon-based positioning service.
Abstract:
Generate tags for content from metadata pre-filtered based on context. A plurality of data items is accessed. Each of the data items has metadata. A context for a user is determined (e.g., at a moment of content capture). One or more of the data items are selected based on the determined context. Upon receipt of content, the received content is compared with the selected data items to identify matches. Metadata is selected from the metadata associated with the matching data items. The selected metadata is associated with the captured content.
Abstract:
A method is provided for obtaining a temporary ID. A request is created for a temporary ID for a first user that has a permanent ID for being contacted through a first mode of communication. The request, which includes at least one usage rule provided by the first user, is sent to an ID generator. A temporary ID that allows a second user to contact the first user through the first mode of communication without knowing the permanent ID of the first user is received from the ID generator. The temporary ID is mapped to the permanent ID of the first user and is mapped with the at least one usage rule. The at least one usage rule limits use of the temporary ID to contact the first user through the first mode of communication. Akso provided are a method for providing a temporary ID and a method for using a temporary ID.
Abstract:
A system (20) for controlling user access to a wireless client device (21) can include a receiver (27) and a processor (28). The processor can be programmed to enable access to a permission settings database (23) over-the-air and dynamically modify at least one permission setting for an API (24) that interfaces with an application (25) residing at least partially on the client device. The processor 28 can be programmed to authenticate an authorized administrator remotely, modify a permission setting, add or remove, update, or enable or disable security for a functional group. An enterprise server (21) can be used as the interface for changing the permissions settings remotely. Furthermore, the enterprise server can be connected through an authorization server (22) to provide any required authorization. Of course, the user can also make allowable changes to the permission settings database via a device user interface (26).
Abstract:
Networked icon (108) interacts with the electronic device user and uses user input (102), context information (104) and network information (106) to automatically update the icon's representation to the user. Icon (108) is also associated with user profile interaction history information (112), navigation logic (114), multimedia presentations (116), network interfaces (118), etc. in order to provide the user with enhanced interaction with the electronic device the icon (108) is associated with.